Browse Definitions :

Write for us!

Have knowledge to share? Want to advance your career? Write for us! 

WhatIs.com is a self-education tool about information technology with over 10,000 terms and resources available. A TechTarget-owned website, WhatIs.com provides our visitors with in-depth, problem-solving technical content. The majority of our content is written by staff and industry thought leaders, but we always have room for contributions from within the enterprise IT community. Become a contributor, promote your personal brand and join our legion of influencers in every major enterprise technology segment.

In this IT encyclopedia, we provide writers with the opportunity to contribute up-and-coming technology definitions by explaining what it is, what it does, how it works, who uses it and why it's important.

To discuss your ideas for contributing or updating a term, please send an email to [email protected].

General Submission Guidelines

What topics can I write about?
When coming up with definition ideas, ask yourself: Would an explanation of this term be beneficial to a wide audience? Is this term still relevant or heavily used? Do I understand the term well enough to translate it into plain English? Are there enough external resources for me to gather information about the term? It also helps to check if the definition already exists on WhatIs.com, or any of the TechTarget websites, and whether it needs to be written from scratch or simply updated.

Can I contribute to a definition that is already published on the site?

Of course! If you see a definition that needs updating or you have important information that would make our readers more informed about the topic, please share it with us.

Are there any guidelines to writing a definition?

The main goal about writing a definition is to answer the six crucial questions:

  1. What is it?
  2. What does it do?
  3. How does it work?
  4. Who uses it?
  5. Why is it important?
  6. Is there anything else I need to know in order to be knowledgeable on the subject?

A more in-depth list of guidelines and tips can be given upon request.

Can I reuse the articles I write for TechTarget ?
Content must be previously unpublished and contributors must agree not to republish the content, except as part of a longer book written primarily by the contributor.

How long should my content be?
While there is no limit to the length of content, we encourage a minimum of 500 words. We have found 500 - 1000 words to be the sweet spot for both readability and searchability. If we agree to publish your article, we will send you a writer's agreement that defines our required criteria in more detail. 

What do I get when I write for TechTarget?
If your content is accepted for publication, you will be listed as the contributor for the definition and the opportunity to provide a link. Links can be direct to a LinkedIn profile, company website or a dedicated TechTarget contributor page.

Can I link to my company or organization's website in the content I write?
Links to company-related information and products can be added to your contributor tag.

Can I include links in my article?
As a contributor, you can suggest links but TechTarget editors will have the last call. 

What visibility will I receive?
Your work will be eligible to be featured in a newsletter and promoted across social media.

Can I link to my TechTarget article from other websites?
Links on social media and blogs are a great way to stir up readership and increase visibility. 

Can I respond to comments?
You bet, interaction is always welcome; comments and discussion are indications of great content. 

Can I include photos or videos?
Photos and videos are welcome, but please be sure you have the right to use the material and that you credit your sources.

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close