MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with B
  • Brocade Certified Architect for FICON

    Brocade Certified Architect for FICON by Brocade

  • Brocade Certified Ethernet Fabric Professional

    Brocade Certified Ethernet Fabric Professional by Brocade

  • Brocade Certified Fabric Administrator Gen 5

    Brocade Certified Fabric Administrator Gen 5 by Brocade

  • Brocade Certified Fabric Designer

    Brocade Certified Fabric Designer by Brocade

  • Brocade Certified Fabric Professional Gen 5

    Brocade Certified Fabric Professional Gen 5 by Brocade

  • Brocade Certified Layer 4-7 Engineer

    Brocade Certified Layer 4-7 Engineer by Brocade

  • Brocade Certified Layer 4-7 Professional

    Brocade Certified Layer 4-7 Professional by Brocade

  • Brocade Certified Network Engineer

    Brocade Certified Network Engineer by Brocade

  • Brocade Certified Network Professional

    Brocade Certified Network Professional by Brocade

  • Brocade Certified vRouter Engineer

    Brocade Certified vRouter Engineer by Brocade

  • Brocade Certified vRouter Professional

    Brocade Certified vRouter Professional by Brocade

  • Brouter

    A network bridge and a router combined in a single product. A bridge is a device that connects one local area network (LAN) to another local area network that uses the same protocol.  

  • Brownfield deployment

    An upgrade or addition to an existing network and use of some legacy components. The term come from the building industry, where previously developed (often polluted and abandoned) land is described as brownfield.  

  • Browser Hijaking

    Browser hijacking is the modification of a web browser's settings. The term "hijacking" is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page, error page, or search page with its own. These are generally used to force hits to a particular website, increasing its advertising revenue.

  • Browserless Web

    The browserless Web describes communication over the World Wide Web between programs rather than between people (with their Web browsers) and the server programs at Web sites. 

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url