Intrusion Prevention Fundamentals: Chapter One
March 31, 2006 | WhatIs.com
How do you like the new quiz format? E-mail us and let us know!
- There are a surprising number of pitfalls to holiday writing, even if it's just invitations and corporate communications. How do you spell the name of that red plant your department is hawking for ... (WhatIs.com)
- Test yourself. A WhatIs.com tech vocabulary quiz about chat and Twitter acronyms. (WhatIs.com)
- A quiz to test your knowledge of Agile terms and concepts. Also includes links to an Agile glossary and more resources. (WhatIs.com)
- Quizzes that test your vocabulary about specific information technology (IT) topics.
- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...
Kiosk mode is specialized function that allows Microsoft Windows to provide a single application for users signing on as guests or generic authorized...
Kiosk mode is specialized function that allows Microsoft Windows to provide a single application for users signing on as guests or generic authorized users while preventing access to other files, data and functionality of the operating system and computer.
Microsoft Click-to-Run is a way to quickly install Microsoft products, including versions of Office 2010 and Office 2013.
Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
Age of the customer is the concept that consumers are more empowered than ever because they can access information about products and services over the Internet in real time.
The law of diminishing returns is an economic principle that states that as investment in a single goal increases, while all other variables remain constant, the return on investment will eventually decline.
Apple’s iBeacon uses Bluetooth Low Energy (BLE) to detect a compatible device within a beacon's vicinity.
A gap analysis is a technique used to assess the differences between the current and desired performance levels of a company's systems or applications, as well as determine how to meet those requirements.
Homologation is the certification of a product to indicate that it meets regulatory standards.
Agile business intelligence (BI) is a fast and flexible process that uses agile software development (ASD) methodologies to enable rapid development and allow users to efficiently adapt intelligence-based strategy to business needs.
Data profiling, also called data archeology, is the statistical analysis and assessment of the quality of data values within a data set for consistency, uniqueness and logic.
Business intelligence is a data analysis process aimed at boosting business performance by helping corporate executives and other end users make more informed decisions.
Google Cloud Dataflow is a cloud-based data processing service for both batch and real-time data streaming applications.
KSM (kernel samepage merging) is a Linux kernel feature that allows the KVM hypervisor to share identical memory pages among different process or virtual machines on the same server.
A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system (OS).
Virtual memory ballooning allows a physical host to recapture unused memory on its guest virtual machines and allocate the resource where needed.
Health informatics, a term that includes narrower fields such as clinical and nursing informatics, is the study and management of health information.
A master patient index is an electronic database that holds the names, contact and medical information of patients registered at a care facility.
ICD-9-CM is the current medical coding standard used in hospitals in the United States. It is scheduled to be replaced by ICD-10 by Oct. 1, 2015.
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security.
A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.
Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.
RAID 10, also known as RAID 1+0, combines disk mirroring and disk striping to protect data.
RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID set before any data is lost.
Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM.