Browse Definitions :
337 results for:

server-side logic

Microsoft Power Apps

Definition | Content Management

Power Apps is a suite of Microsoft products that enable both developers and nontechnical users to build custom applications to fulfill various ...

middleware

Definition | App Architecture

Middleware is software that bridges the gap between applications and operating systems by providing a method for communication and data management.

declarative programming

Definition | IT Operations

Declarative programming is a method to abstract the control flow for logic required for software to perform an action. Instead, it involves stating ...

software redundant array of independent disk (software RAID)

Definition | Storage

Software RAID, also known as virtual RAID, is a form of RAID (software redundant array of independent disk) performed on an internal server.

REST (REpresentational State Transfer)

Definition | App Architecture

REST (REpresentational State Transfer) is an architectural style for developing web services and systems that can easily communicate with each other.

client-server network

Definition | SearchWindowsServer

A client-server network is a distributed communications architecture in which a centralized server receives and responds to requests for services and...

What is server virtualization? The ultimate guide

Definition | IT Operations

Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

networking (computer)

Definition | Networking

Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an ...

Scripting vs. programming languages: Where they differ

Tip | App Architecture

Choosing a programming language is often dictated by the problem the programmer wants to solve and the compute goal that a language is designed to ...

Learn how New Relic works and when to use it for IT monitoring

Tip | IT Operations

New Relic is one of many tools that can help an IT team track application performance and health. Before adoption, understand primary use cases and ...

web development framework (WDF)

Definition | Content Management

A web development framework is a set of resources and tools for software developers to build and manage web applications, web services and websites, ...

client-side framework

Definition | App Architecture

A client-side framework is a software development framework that focuses on executing application processes on end user devices rather than the ...

Eclypsium: Ivanti firmware has 'plethora' of security issues

News | Security

In its firmware analysis, Eclypsium found that the Ivanti Pulse Secure appliance used a version of Linux that was more than a decade old and several ...

An intro to the IDMZ, the demilitarized zone for ICSes

Feature | Security

Setting up an IDMZ -- a demilitarized zone between enterprise and industrial networks -- can prevent operational environments from becoming ...

Amazon Bedrock users adapt app dev to GenAI

News | Software Quality

Early adopters of Amazon Bedrock shared lessons learned about incorporating generative AI into software engineering workflows, from managing cloud ...

What are microservices? Everything you need to know

Definition | App Architecture

Microservices, or microservices architecture, is an approach to the design and implementation of enterprise applications in which a large application...

6 quick server troubleshooting tips

Tip | IT Operations

Understand, communicate, monitor, check logs, ask for support. Follow these guidelines and make troubleshooting server problems quick and easy.

10 DevOps engineer skills to add to your resume

Tip | IT Operations

DevOps plays a critical role in modern IT. As app development and deployment practices change, orgs will seek pros with hands-on experience -- and ...

Why Wasm is the future of cloud-native app development

Opinion | IT Operations

Just over a month into 2023, the popularity of WebAssembly is already on the rise. An industry expert explains why Wasm will have far-reaching ...

12 top open source databases to consider

Feature | Data Management

Open source databases are viable alternatives to proprietary ones. Here's information on 12 open source and source available technologies for ...

Why WebAssembly? Top 11 Wasm benefits

Tip | TheServerSide.com

Latency and lag time plague web applications that run JavaScript in the browser. Here are 11 reasons why WebAssembly has the potential to completely ...

5 techniques to debug network issues in Linux and Windows

Tip | Networking

Debugging a network issue should start with basic troubleshooting. If that doesn't fix it, admins should check, verify and configure connections to ...

6 stages of the ransomware lifecycle

Tip | Security

Know thy enemy. By understanding the nuances of the ransomware lifecycle, enterprise security teams can best protect their organizations from attacks.

Compare GPUs vs. CPUs for AI workloads

Feature | Enterprise AI

GPUs are often presented as the vehicle of choice to run AI workloads, but the push is on to expand the number and types of algorithms that can run ...

3 critical stops on the back-end developer roadmap

Tip | App Architecture

When it comes to acquiring the skills needed to be a proficient back-end developer, there are no shortcuts. Some of the topics to know will be ...

Top 10 cloud computing careers of 2024 and how to get started

Feature | WhatIs

Cloud computing touches many aspects of modern life, and the need for cloud professionals is great. Learn about the necessary skills and education ...

How startup Once.net and Cloudflare secured the 2023 Eurovision vote

News | ComputerWeekly.com

When the Eurovision Song Contest introduced paid-for public voting from outside Europe in 2023, it faced new cyber challenges. Learn how Dutch ...

computer network

Definition | Networking

A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.

Docker

Definition | IT Operations

Docker is an open source software platform used to create, deploy and manage virtualized application containers on a common operating system (OS), ...

What is hyperconverged infrastructure? Guide to HCI

Definition | Data Center

Hyperconverged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single ...

3 ways to troubleshoot using Wireshark and tcpdump

Tutorial | Networking

Protocol analyzer tools, such as Wireshark and tcpdump, can help network administrators identify protocols in the network, analyze network ...

web stack

Definition | WhatIs

A web stack is the collection of software used for web development that incorporates, at a minimum, an operating system (OS), a programming language,...

What is IT/OT convergence? Everything you need to know

Definition | IT Operations

IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.

encryption

Definition | Security

Encryption is the method by which information is converted into secret code that hides the information's true meaning.

direct-attached storage (DAS)

Definition | Storage

Direct-attached storage (DAS) is a type of storage that is attached directly to a computer without going through a network.

operator

Definition | WhatIs

In mathematics and computer programming, an operator is a character that represents a specific mathematical or logical action or process.

Dynatrace overhauls AIOps back end, beefs up log analytics

News | IT Operations

The AIOps vendor unveiled a new approach to data management that has enterprise customers such as BT hopeful it could eliminate the need for separate...

Top 7 must-have IoT skills to boost your career

Feature | WhatIs

The internet of things is growing rapidly and becoming increasingly complex. IoT professionals will need an array of skills to succeed as this trend ...

Is HTML a programming language?

Feature | TheServerSide.com

Unlike Java, Python or C, HTML is not a programming language because it lacks variables, conditional statements or iterative loops. But so what? HTML...

Knative

Definition | IT Operations

Knative is an open source project based on the Kubernetes platform for building, deploying and managing serverless workloads that can run in the ...

Exchange Server bugs caused years of security turmoil

News | Security

The four high-profile sets of security vulnerabilities in Microsoft Exchange Server, disclosed by researcher Orange Tsai, are set to remain a major ...

CNCF hosts WebAssembly server-side projects

News | IT Operations

Once strictly a web browser utility, WebAssembly may soon be coming to a server near you and bringing with it a new level of computing abstraction to...

Examine a captured packet using Wireshark

Tutorial | Networking

Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what ...

What is network-attached storage (NAS)? A complete guide

Definition | Storage

Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from ...

5 ethical hacker certifications to consider

Tip | Security

From Offensive Security Certified Professional to GIAC Web Application Penetration Tester, learn about the certifications worth earning to begin your...

Top 12 application performance monitoring tools

Tip | App Architecture

Discover the basic capabilities to evaluate when choosing an APM tool, and then review a list of APM vendors to help you get started with your ...

11 cloud programming languages developers need to know

Tip | Cloud Computing

How do you choose the cloud programming language that best suits your current and future needs? Explore 11 popular options and their use cases.

NAS gateway

Definition | WhatIs

NAS gateway is a NAS (network-attached storage) system in which the storage media are externally attached, typically over a Fibre Channel interface.

16 PowerShell commands for network troubleshooting

Tip | Networking

These 16 Windows PowerShell cmdlets, including Get-NetIPAddress and Test-Connection, help network administrators troubleshoot their network ...

The impact of generative AI on the datacentre

Feature | ComputerWeekly.com

While artificial intelligence will not live up to its name any time soon, mass adoption of large language models, whether by customers or in-house, ...

How to prevent SQL injection with prepared statements

Feature | Security

One of the top defenses against SQL injection is prepared statements. In this book excerpt, learn what prepared statements are and how to extend ...

Protecting children by scanning encrypted messages is ‘magical thinking’, says Cambridge professor

News | ComputerWeekly.com

Ross Anderson argues in a rebuttal to GCHQ experts that using artificial intelligence to scan encrypted messaging services is the wrong approach to ...

Tips and tricks for TypeScript programming

Tip | TheServerSide.com

For those new to TypeScript or for Java developers transitioning into JavaScript, these three TypeScript tips and tricks modern day software ...

Using the BFF pattern to keep UIs flexible and reliable

Tip | App Architecture

BFF is a simple design pattern that can help developers address UI-related challenges, such as problematic coupling, overfetching of data and ...

Today's blockchain use cases and industry applications

Feature | CIO

Though not yet a mature technology, blockchain is gaining ground as a sound and generally secure method for conducting myriad transactions in ...

How to use Wireshark to sniff and scan network traffic

Tip | Security

Wireshark continues to be a critical tool for security practitioners. Learning how to use it to scan network traffic should be on every security ...

The architectural impact of RPC in distributed systems

Tip | App Architecture

It has become increasingly important for software architects to understand the mechanics behind remote procedure call (RPC), particularly its role in...

Make data usability a priority on data quality for big data

Tip | Data Management

To help make big data analytics applications more effective, IT teams must augment conventional data quality processes with measures aimed at ...

How to convert binary to decimal

Tip | Networking

It's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, default gateways and ...

flash storage

Definition | Storage

Flash storage is any type of drive, repository or system that uses flash memory to write and store data for an extended period.

12 API security best practices to protect your business

Tip | App Architecture

As with any software development cycle, API security must be built in from the start. Follow these guidelines to design, deploy and protect your APIs.

'ProxyShell' Exchange bugs resurface after presentation

News | Security

A critical vulnerability in Microsoft Exchange is once again making the rounds with attackers, following a Black Hat presentation from the researcher...

What is the difference between a socket and a port?

Answer | Networking

Sockets, ports and port numbers have functional overlap, but the terms are distinct. A socket is part of a port, while a port number is part of a ...

What will IoT 2.0 look like?

Guest Post | IoT Agenda

Many IoT projects have failed to progress beyond the experimental stage because of cost and complexity, but IoT 2.0 will bring highly scalable and ...

WLAN security: Best practices for wireless network security

Feature | Security

Follow these wireless network security best practices to ensure your company's WLAN remains protected against the top threats and vulnerabilities.

network node

Definition | Networking

A computer network is a system of computers and computing devices that are connected via communication links.

How Bet365 addressed Apple’s iOS App Store policy changes

News | ComputerWeekly.com

Apps on the iOS app store need to be more ‘Apple like’, with a common user experience. We find out how Bet365 achieved app portability

Developers, 'Blazor' a new path to web app creation

Guest Post | TheServerSide.com

Expert and Blazor blogger Chris Sainty explains how developers can use a free, open source framework, still under development at Microsoft, to create...

virtual networking

Definition | Networking

Virtual networking is the abstraction of network resources from the underlying physical network infrastructure.

performance testing

Definition | Software Quality

Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device ...

Look for PCIe 5.0, NVMe 2.0 to boost storage performance

Feature | Storage

Enterprises that need high-performance storage for AI and ML workloads can keep an eye out for new products based on the latest PCIe 5.0 and NVMe 2.0...

Oracle analytics update adds CX app, semantic modeling tool

News | Business Analytics

The tech giant's latest platform update adds capabilities designed to improve the productivity of business users and reduce organizations' reliance ...

Navigate service discovery in a microservices architecture

Tip | App Architecture

Microservices move rapidly, making streamlined service discovery a must. Learn more about the specific types of discovery approaches and how to ...

How micropatching could help close the security update gap

Tip | Security

Countless known but unpatched vulnerabilities pose significant, ongoing risk to the typical enterprise. Learn how micropatching could help close the ...

10 microservices patterns all architects should know

Feature | App Architecture

Choosing the right design pattern is a critical part of managing a microservices-based architecture. Here are 10 distributed design approaches that ...

How viable is it to create microservices in Python?

Tip | App Architecture

Python offers microservices developers access to advanced scripting, embedded testing and plugin tooling. But is it a good fit for you? And what are ...

Reduced cost, responsive apps from micro front-end architecture

Feature | TheServerSide.com

Micro front-end development has grown in prominence though has not yet found its footing in the enterprise. Learn more about micro front ends and ...

Test-Driven Development Series Part 2 - Testing Java Classes with JUnit

News | TheServerSide.com

The first article is a concept piece explaining why testing helps in an enterprise server-side software environment. Most software applications today...

A Red Hat Hyperconverged Infrastructure deep dive

Feature | Data Center

Hyper-converged infrastructure is a popular platform for compute, storage and networking. So where does Red Hat fit in with its variety of HCI ...

Social media conglomerate Facebook on streamlining its hyperscale datacentre buildouts

News | ComputerWeekly.com

Facebook offers a look at how its approach to designing and building its datacentres has evolved to keep pace with the growing demands of its growing...

WebAssembly Hub boosts Envoy filter development

Tutorial | TheServerSide.com

Examine WebAssembly Hub's features, why developers have turned to the portal to share Envoy filters and how it seems to be built for the long haul.

How to build a Kubernetes operator

Tutorial | IT Operations

Operators unleash the full power of developing complicated offerings or abstractions on Kubernetes. And, while they have a lot of potential, there is...

Fundamental patterns for service discovery in microservices

Tip | App Architecture

Service discovery is a huge part of managing a microservices-based application. We examine helpful service discovery patterns developers can use for ...

Learn how to mitigate container security issues

Feature | Security

The more companies embrace application containerization, the more they need to know about container security issues and attack prevention methods.

How COVID-19 created a demand for COBOL basics

Feature | TheServerSide.com

An uptick in COBOL interest stems from its presence in entrenched, legacy government apps, such as unemployment or apps for emergency loans. A rush ...

NVMe over Fabrics startup Lightbits Labs adds clustering

News | Storage

Lightbits Labs' LightOS now enables application servers to access NVMe flash SSDs in a cluster of servers -- not just a single box -- over standard ...

live migration

Definition | IT Operations

Live migration refers to the process of moving a virtual machine running on one physical host to another host without disrupting normal operations or...

Tomcat vs. Apache HTTP Server: What's the difference?

Video | TheServerSide.com

Don't get caught up in the improper phrasing of "What's the difference between Tomcat and Apache?" Let's straighten out the confusion and compare the...

How to start using a BDD framework

Tip | App Architecture

Why bother with behavior-driven development? Learn how this Agile-focused development framework can help bolster application quality, and explore ...

JASK buy may boost security analytics in Sumo Logic SIEM

News | IT Operations

Sumo Logic has acquired JASK, an automated SOC that will be most useful for security analytics and alert reduction features within Sumo Logic's SIEM.

Microsoft Storage Spaces Direct simplifies converged, HCI storage

Tip | Data Center

Storage Spaces Direct in Windows Server packages several different Microsoft technologies to lower TCO and simplify storage in converged and ...

Server lifecycle approach lowers risk, raises app performance

Feature | Data Center

Nemertes Research CTO John Burke warns that a server's lifecycle may be shorter than you think and offers a four-stage approach to maintain ...

infrastructure (IT infrastructure)

Definition | Data Center

Infrastructure is the foundation or framework that supports a system or organization.

Evaluate must-have CDN features before choosing a product

Feature | Networking

No two CDN services are identical. Explore the main feature and function areas available in today's content delivery network market to better narrow ...

Understand cloud abstraction for your IT needs

Tip | Cloud Computing

Cloud users must select a cloud abstraction layer that meets their business requirements. Consider factors such as level of control and security when...

A buyer's guide to S/4HANA Cloud SaaS ERP

Feature | SearchSAP

SAP's multi-tenant SaaS ERP, S/4HANA Cloud, is a viable choice for companies that need ease in their infrastructure management. Learn what it offers ...

10 of the best programming languages to learn in 2020

Tip | App Architecture

Different jobs call for different programming languages, and the wrong choice could cause your project to fail. Add these tools to your must-learn ...

Review these Azure Service Bus best practices

Tip | Cloud Computing

When applications talk, you need to listen. Learn about Microsoft's cloud messaging service, its main features, best practices to follow and ...

Interview: Paul Douglas, Scottish Water

News | ComputerWeekly.com

Building an enterprise architecture involves balancing near- and mid-term goals with longer-term business objective, cost and technical challenges, ...

Weighing the cost of mitigating Spectre variant 2

Tip | Security

Fixes for the Spectre variant 2 vulnerability affect system performance, so some in the tech sector wonder whether they're worth it. Expert Michael ...

Networking
  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared ...

Security
CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • succession planning

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

  • recruitment

    Recruitment is the process of finding, screening, hiring and onboarding qualified job candidates.

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close