Browse Definitions:
11,846 results for:


Definition | SearchEnterpriseWAN

An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's ...

WAN interface card (WIC)

Definition | SearchEnterpriseWAN

A WAN interface card, or WIC, is a specialized network interface card (NIC) that allows devices to connect to a wide area network.

WGate (Web gateway)

Definition | SearchSAP

WGate (for Web gateway) is one of two major components of the Internet Transaction Server (ITS) from SAP, the software company that provides a ...

Layer Two Tunneling Protocol (L2TP)

Definition | SearchEnterpriseWAN

Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to ...

ISDN (Integrated Services Digital Network)

Definition | SearchEnterpriseWAN

ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as ...

capacity planning

Definition | SearchEnterpriseWAN

In information technology, capacity planning is the science and art of estimating the space, computer hardware, software and connection ...

T1 (T-1)

Definition | SearchEnterpriseWAN

Also see the T-carrier system, of which the T1 is a part.


Definition | SearchSQLServer

Yukon is the code name used for the beta version of Microsoft's SQL Server 2005. SQL Server 2005 is said to provide enhanced flexibility, scalability...

ODL (Open and Distance Learning)

Definition | SearchSQLServer

Open and Distance Learning (ODL) is a general term for the use of telecommunication to provide or enhance learning.

record standardization

Definition | SearchSQLServer

In data management, record standardization is a process in which files are first parsed (assigned to appropriate fields in a database record) and ...



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.