Browse Definitions :
89 results for:

arrow functions

Arrow adds more XaaS support to cloud platform

News | MicroScope

Distributor bolsters management features on ArrowSphere as it responds to market demands, while elsewhere TD Synnex bolsters AI support

business process mapping

Definition | CIO

Business process mapping is the visual display of the steps within a business process showing how it's done from start to finish.

Windows key (winkey)

Definition | Enterprise Desktop

The Windows key (winkey) is a button on a Windows computer keyboard.

Top business process modeling techniques with examples

Tip | CIO

Business process modeling techniques and tools provide a visual representation of processes that's crucial to effectively monitoring, improving and ...

semantic network (knowledge graph)

Definition | Content Management

A semantic network is a knowledge structure that depicts how concepts are related to one another and how they interconnect.

logical equivalence

Definition | WhatIs

Logical equivalence is the condition of equality that exists between two statements or sentences in propositional logic or Boolean algebra.

Channel roundup: Who’s gone where?

News | MicroScope

Several senior appointments caught the eye in the past week, and a resignation created the chance for an opening

collaboration diagram

Definition | Software Quality

A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in ...

Improve automation skills with the AD Administrative Center

Tip | SearchWindowsServer

You might know that you can use PowerShell to handle repetitive Active Directory tasks. But were you aware the Active Directory Administrative Center...

8 network tasks administrators can do quicker from the CLI

Tip | Networking

Admins can use the command-line interface to manage network tasks. Learn how to streamline automation, troubleshoot networks and manage services on ...

Excel for HR: The essential formulas and functions

Tip | HR Software

Using Excel can benefit HR professionals in various ways, including saving them time so they can work on other tasks. Learn 12 important formulas and...

9 tips to improve Python performance

Tip |

Python performance gets a bad rap compared with languages such as Java. Use these tips to identify and fix problems in your Python code to tweak its ...

3 rules to adapt cloud change management policies

Opinion | Cloud Computing

Having a change management policy can minimize risk when it comes to making changes. Follow these rules to adapt cloud change management policies and...

Developing the subscription model

Feature | MicroScope

Customers and channel partners are moving to a world where flexible monthly payments are the norm, but that has meant distribution has had to take ...

M2MC claims a first for IoT messages delivery

News |

Comms management firm’s acknowledgement feature will form part of a ‘unique’ integration platform, aiming to increase significantly the reliability ...

Manchester encoding

Definition | Networking

In data transmission, Manchester encoding is a form of digital encoding in which a data bit's state -- 0 or 1 -- is represented by the transition ...


Definition | CIO

Workflow is the series of activities that are necessary to complete a task.

Channel round-up: Who’s gone where?

News | MicroScope

It’s time for the channel to update their contacts books as more personnel moves are made across the industry


Definition | WhatIs

A transistor is a miniature semiconductor that regulates or controls current or voltage flow.

Top 11 IoT online courses to boost your career (free and paid)

Feature | WhatIs

Are you ready to get started or move to the next level learning about IoT system design and technology? One of these certification or degree programs...

Digitization sparks growth for EAM systems

Feature | ERP

The EAM software market is growing with more options for asset management. Experts argue that companies may benefit from tighter integration between ...


Definition | SearchWindowsServer

Microsoft is the largest vendor of computer software in the world.

AMD Virtualization (AMD-V)

Definition | IT Operations

AMD-V (AMD Virtualization) technology refers to a set of hardware extensions and on-chip features for the AMD family of x86 microprocessors.

Channel roundup: Who’s gone where?

News | MicroScope

Personnel changes at Arrow ECS, Exertis and Emarsys, and Agilitas IT Solutions backs its sustainability commitments

operation (computing)

Definition | WhatIs

An operation, in computing, is an action that is carried out to accomplish a given task.


Definition | WhatIs

A menu is a set of options presented to the user of a computer application to help them find information or execute a function.

critical path method (CPM)

Definition | WhatIs

The critical path method (CPM) is a step-by-step project management technique for process planning that defines critical and non-critical tasks with ...

Dremio opens up data lakehouse with new engine

News | Data Management

The data lakehouse vendor is expanding its cloud platform with a new SQL query engine and data metastore for data lakes that builds on top of the ...

How to use virtual whiteboards on Zoom and Microsoft Teams

Feature | Unified Communications

Whiteboards in remote meetings can add another layer of collaboration by enabling users to visualize concepts. Learn how to use virtual whiteboards ...

What is PowerShell and how to use it: The ultimate tutorial

Definition | SearchWindowsServer

PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT ...

16 PowerShell commands for network troubleshooting

Tip | Networking

These 16 Windows PowerShell cmdlets, including Get-NetIPAddress and Test-Connection, help network administrators troubleshoot their network ...

Tuning enterprise architecture to cope with accelerating change

Guest Post | IT Channel

In the realm of enterprise architecture, real agility starts with architectural simplicity. Learn how businesses can reduce complexity -- and boost ...

A better Gitflow diagram with branches, merges and color

Infographic |

Developers deserve a better Gitflow diagram, so we've given it to them. See the new and improved Gitflow diagram with support and bugfix branches and...

5 best Java 17 features that developers will love

Tip |

The new Java 17 release contains plenty of new features that will intrigue developers. Here are five features that should push developers off the ...

Use these PowerShell add-ons to supercharge your experience

Tip | SearchWindowsServer

These PowerShell new features and modules introduce several customization and functionality features to the popular automation tool to ease coding ...

Interview: Sofie Blakstad, CEO, hiveonline

News |

Everywoman in Technology award winner and CEO of hiveonline, Sofie Blakstad, has a long history in the tech sector, and has been using tech to help ...

Nordic CIO interview: Tommi Tuovila, Neste

News |

Former Olympian talks to Computer Weekly about the challenges facing CIOs in a rapidly changing world

bash (Bourne again shell)

Definition | Data Center

Bash (Bourne Again Shell) is the free and enhanced version of the Bourne shell distributed with Linux and GNU operating systems.

128 Technology delivers routing software, SD-WAN on white box

News | Networking

128 Technology integrated its routing software and SD-WAN capabilities with white box CPEs from Lanner. Arrow Electronics will preconfigure the ...

Cloud ERP system selection: How to evaluate your company needs

Feature | ERP

This article can help you evaluate your business needs and make sure you're getting the right cloud ERP system for your organization.

Nutanix aims for SMB growth with channel Cloud Bundles

News | MicroScope

Enterprise cloud player is looking for SMB growth across EMEA and views the channel as key to its ambitions

Rackspace partners get sales tool; Workplace by Facebook taps channel

News | IT Channel

A Rackspace tool for speeding up the cloud sales process is now available, while MNJ Technologies has become a Workplace by Facebook reseller; more ...

Software accessibility testing: Standards, strategy and tools

Tip | Software Quality

Assistive technology ensures that all customers can access software easily. Don't overlook this important element of software quality. Here's how to ...

reactive programming

Definition | App Architecture

Reactive programming describes a design paradigm that relies on asynchronous programming logic to handle real-time updates to otherwise static ...

Quest targets managed services market with new partner offering

News | IT Channel

Quest Software introduced a partner program with benefits and support geared toward the managed services business model; other channel news from the ...

Kotlin vs. Swift: An open source programming language face-off

Tip | App Architecture

Take a look into what Kotlin and Swift have to offer in terms of cross-platform capabilities, library support and ease of use. Also, review their ...

Learn how to configure NSX firewall rules

Tip | SearchVMware

VMware NSX users can configure firewall rules into specific policies to protect individual VMs, regardless of their location in the virtual ...

Simplify Java-based development with the Kotlin language

Tip | App Architecture

What makes Kotlin popular among Java professionals? Explore the attributes of this functional programming language that's equipped for both ...

Vote: Who should be the 2023 Most Influential Woman in UK Tech?

News |

Each year, we ask our audience who should be named the most influential woman in UK technology. Tell us what you think – the deadline for voting is 7...

Accenture partnership with Splice Machine sealed by investment

News | IT Channel

Read how Accenture and Splice Machine have deepened their alliance, taking aim at large-scale data transformation projects, and other channel news ...

Avaya Zang upgrades workflow, IoT tools

News | Unified Communications

Avaya Zang has upgraded its CPaaS platform with new workflow and IoT tools. The vendor is also making it easier to integrate Zang apps with Avaya UC ...

A comparison of 6 top programming languages

Tip | App Architecture

Choosing the right programming language can be tough. We place six popular languages head to head: Python vs. Ruby, Kotlin vs. Swift and Erlang vs. ...

The real Oracle cloud strategy that may work vs. AWS and Azure

Opinion | SearchOracle

Oracle's database software is at the heart of its efforts to move users to its cloud. And that strategy might work, despite Oracle's inauspicious ...

Channel roundup: Who's gone where?

News | MicroScope

Another busy week with several comings and goings to report on from across the channel

SMEs changing the bundles approach

News | MicroScope

Bundles have often been a bit hit and miss but thanks to the need to cater them for SME customers things are improving

Unify partner program reduces certification demands

News | IT Channel

In an effort to simplify its channel partner program, UC vendor Unify has cut back certification requirements across its portfolio; more IT channel ...

Use vROps Manager to perform system health monitoring

Tip | SearchVMware

VRealize Operations Manager is a system health monitoring tool that highlights issues in your virtual environment and steers you in the right ...

Amazon Inspector gives dev automated security assessment

Tip | SearchAWS

Cloud vulnerabilities can quickly evolve into security threats; vigilance is a key in identifying weaknesses. Amazon Inspector detects common ...

Top ten channel technologies of 2017

Feature | MicroScope

The most discussed technologies of last year are also set to dominate 2018 so here is a look back with more than a hint of the themes to come

Use cases for object storage ramp up to meet emerging demands

Feature | Storage

Computational and storage advances are expanding the role of object storage beyond traditional HPC and cloud to emerging data analytics, machine ...

How cyber warfare laws limit risk on a digital battleground

Feature | Security

Retired Navy cryptologist implores enterprises to build key cyber warfare laws into their infosec strategy to improve survivability on the digital ...

Telecom trends 2019: Time for operator 5G and IoT decisions

Tip | Networking

Telecom trends in 2019 dictate that network operators have tough choices to make to compete with OTT players, increase revenue in terms of 5G and IoT...

6 enterprise AR use cases

News | CIO

Augmented reality is making its way into the enterprise. Here, experts detail six AR use cases and how AR headsets are helping boost productivity and...

Cloud tops the menu in 2020, with helpings of HCI, security and 5G

Feature | MicroScope

We ask the channel what technologies and trends they see dominating in 2020 – cloud tops the list, with hyper-convergence, security and 5G also ...

Steps to generate an HTTP response header with AWS Lambda

Tip | SearchAWS

Some AWS users have difficulty setting HTTP response headers based on Lambda functions. Chris Moyer explains how to accomplish that task, and how it ...

Coronavirus: Is Zoom safe and should security teams ban it?

News |

Zoom’s rapid rise to prominence has highlighted a score of security problems with the service. Should CISOs try to steer their organisations away ...

Datto partners swell in numbers amid global expansion

News | IT Channel

Datto is planning updates to Autotask Endpoint Management and Autotask PSA in the coming months, as it continues to integrate its product lines; ...

Choosing the right big data analysis tools

Feature |

In order to choose the right big data analysis tools, it’s important to understand the transactional and analytical data processing requirements of ...

Anomali targets managed security service providers for global expansion

News | IT Channel

Threat management platform vendor Anomali said it will tap MSSPs for help reaching medium-sized businesses; other channel news from the week.

Microsoft SQL Server data profiling tool put to work

Feature |

Andy Hogg demonstrates how to clean up dirty data with the data profiling tool that comes with Microsoft SQL Server

The role of a software test manager

Tip | Software Quality

Effective software test managers not only understand the discipline of testing, but they are also able to manage and implement a testing process in ...

Attackers ultimately drive security market, analyst says

News |

The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal ...

Hotmail makes sign-in changes, can't please everyone

News |

The Hotmail sign-in page is in the news this week, with subtle changes to browser auto-complete behaviour to provide wider browser compatibility.

Office Telemetry reports on Office 2013 docs and apps

Tip | Enterprise Desktop

If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data.

OSGi: A Proven Approach for Developing Modular Applications

Feature |

OSGi provides a framework for developing modular enterprise applications by installing a set of (preferably reusable) component modules.

Using system properties to configure Windows 7 options

Feature | IT Channel

The system properties dialogue box in Windows 7 is split up into five tabs that let you change your customer's computer name or dual-boot settings.

PowerShell commands in Windows Server 2008 R2

Feature | IT Channel

Use this chapter excerpt to learn about PowerShell commands for Windows Server 2008 R2, as well as other PowerShell uses, features, enhancements and ...

Modularizing the Hibernate SessionFactory with the Spring framework

Feature |

This paper outlines a method for modular application development using Spring and Hibernate. The approach described has similarities to the OSGi or ...

How to use SQL Developer to run SQL statements

Feature | SearchOracle

In this chapter, learn how to use SQL Developer to enter and execute SQL statements and scripts, work with a Snippets window, solve common syntax ...

Code Analysis with the Eclipse Profiler

News |

In my experience as a software professional, I often have the need to analyse an existing body of code in order to understand it. Everyone tries his ... for dummies: Creating daily reports

Feature | Customer Experience

Use this step-by-step guide to create daily reports from scratch in

Introduction to Information Security: A Strategic-Based Approach

Feature | Security

In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the ...

IT project management: The cost estimating process

Feature | Data Management

Learn about the cost estimating process in IT project management by reading examples and definitions of cost estimation terms, in this free chapter ...

Hardware devices for Windows 7: Installation, management

Feature | IT Channel

Ease Windows 7 management by knowing the different types of hardware devices, such as internal drives, that can be installed, and how to use Windows ...

Setting Windows 7 environment variables

Feature | IT Channel

This chapter excerpt can teach you how to use Windows 7 environmental variables to locate your customers' system files and folders.

Nuts and Bolts of Transaction Processing

News |

This article walks the reader through the transaction processing and ACID.

Understanding run-level scripts in Fedora 11 and RHEL

Feature | IT Channel

Solutions providers can use run-level scripts in Fedora 11 and Red Hat Enterprise Linux (RHEL) to start certain services and execute various commands.

SQL Server Integration Services (SSIS) tools

Feature | IT Channel

Server 2005 Integration Services (SSIS) introduces a rich toolset that supports development, deployment and administration of extract, transform, ...

Introduction to m2eclipse

News |

In this article, we will explore the features m2eclipse provides and help you start using an Eclipse plugin which provides real Maven integration for...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...