Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog

Author - Forrest Stroud

  • Forrest Stroud has been with the QuinStreet Enterprise network of technology websites for 18 years, during which time he has covered everything from consumer technology to small businesses and corporate data centers. He is also the editor of ServerWatch.

  • IDaaS - Identity-as-a-Service

    IDaaS, or Identity-as-a-Service, refers to identity and access management services that are offered through the cloud or SaaS on a subscription basis. »

  • IAM – Identity and Access Management

    IAM refers to a framework of policies and technologies for ensuring the proper people in an enterprise have the appropriate access to IT resources. »

  • Shadow IT

    Shadow IT is a term that refers to IT applications and infrastructure managed and utilized without the knowledge of the enterprise's IT department. »

  • Third Platform

    The Third Platform is a term that distinguishes the current IT environment of mobile, social, cloud and Big Data from earlier eras of computing. »

  • Clutter

    Clutter automatically organizes Microsoft Outlook inboxes and prioritizes important e-mails by moving lower priority messages to a new Clutter folder. »

  • HCM - Human Capital Management

    Human capital management is a business philosophy that views employees as a quantifiable asset whose future value can be increased through investment. »

  • Microsoft Edge

    Microsoft Edge is a new web browser in Windows that serves as a streamlined, improved replacement for the venerable Internet Explorer Web browser. »

  • infrastructure

    An enterprise's entire collection of hardware, software, networks, data centers and facilities used to develop, test, operate, monitor and/or support information technology services. »

  • VENOM vulnerability

    VENOM refers to a security vulnerability that results from a buffer overflow in a kernel-level driver included in many default virtualized environments. »

  • Mumblehard malware

    The Mumblehard malware primarily targets web servers running Linux and BSD operating systems and secretly uses the infected systems as spamming bots. »

  • OpenStack Kilo

    The successor to the Juno release of the OpenStack open source cloud computing platform, OpenStack Kilo arrived in April 2015 as the eleventh release of OpenStack. »

  • OpEx

    An acronym for Operating Expenses, OpEx refers to the ongoing costs associated with the daily operations of business products, services and systems. »

  • hyper-converged infrastructure

    A hyper-converged infrastructure is largely software-defined with tightly-integrated compute, storage, networking and virtualization resources. »

  • Vivid Vervet (Ubuntu Codename)

    Vivid Vervet is the Ubuntu codename for version 15.04 of the Ubuntu Linux-based operating system. »

  • cloud-native app

    Cloud-native app is a term promoted by VMware to refer to apps that are installed in cloud-based virtual machines. »

  • EVO:RAIL

    VMware EVO:RAIL is an x86 server-based appliance for combining compute, networking and storage resources into a hyper-converged infrastructure system. »

  • Project Spartan

    Project Spartan is a new Web browser in Windows 10 that Microsoft created to eventually supplant the venerable Internet Explorer Web browser. »

  • iBeacon

    iBeacons are Apple-developed beacon devices that utilize Bluetooth LE wireless signals to deliver location-based product information to iOS devices. »

  • PowerMat

    PowerMat is a wireless charging technology developed to wirelessly power electronics such as smartphones, tablets and wearable computing products. »

  • Force Touch

    A feature developed by Apple that senses the level of force exerted on a touchpad or similar display surface, and responds accordingly. »

(page 1 of 10 )
QUICK REFERENCE
Internet telephony and VoIP: What's the difference?

Internet telephony is broken down into three main categories consisting of PC-to-PC telephony, PC to Phone, and Phone to Phone. We describe each type... Read More »

Internet Telephony Magazine

Internet telephony is broken down into three main categories consisting of PC-to-PC telephony, PC to Phone, and Phone to Phone. We describe each type... Read More »

29 Free Android Apps for Cash-Strapped Students

From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »