- An attack surface is the total sum of the vulnerabilities in a given computing device or network that are accessible to a hacker. Anyone trying to break into a system generally starts by scanning ... (WhatIs.com)
- Latency means delay. In networking, it's an expression of how long it takes for a packet to get from one designated point to another. In a computer system, latency usually refers to any delay or wa... (WhatIs.com)
- A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system. Virtually all software applications and systems produce log fi... (WhatIs.com)
- Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.
- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...
Get answers from your peers on your most technical challenges
Hi CarlosDL, Just to say thanks for sharing. As you say, this is for a specific task but the concepts can be used in a wide variety of scenarios. I'll keep this handy ;-)
Age of the customer is the concept that consumers are more empowered than ever because they can access information about products and services over ...
Age of the customer is the concept that consumers are more empowered than ever because they can access information about products and services over the Internet in real time.
The law of diminishing returns is an economic principle that states that as investment in a single goal increases, while all other variables remain constant, the return on investment will eventually decline.
Apple’s iBeacon uses Bluetooth Low Energy (BLE) to detect a compatible device within a beacon's vicinity.
A gap analysis is a technique used to assess the differences between the current and desired performance levels of a company's systems or applications, as well as determine how to meet those requirements.
Homologation is the certification of a product to indicate that it meets regulatory standards.
Agile business intelligence (BI) is a fast and flexible process that uses agile software development (ASD) methodologies to enable rapid development and allow users to efficiently adapt intelligence-based strategy to business needs.
Data profiling, also called data archeology, is the statistical analysis and assessment of the quality of data values within a data set for consistency, uniqueness and logic.
Business intelligence is a data analysis process aimed at boosting business performance by helping corporate executives and other end users make more informed decisions.
Google Cloud Dataflow is a cloud-based data processing service for both batch and real-time data streaming applications.
Health informatics, a term that includes narrower fields such as clinical and nursing informatics, is the study and management of health information.
A master patient index is an electronic database that holds the names, contact and medical information of patients registered at a care facility.
ICD-9-CM is the current medical coding standard used in hospitals in the United States. It is scheduled to be replaced by ICD-10 by Oct. 1, 2015.
A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system (OS).
Virtual memory ballooning allows a physical host to recapture unused memory on its guest virtual machines and allocate the resource where needed.
A virtual machine (VM) shares physical hardware resources with other users but isolates the operating system or application to avoid changing the end-user experience.
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security.
A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.
Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.
RAID 10, also known as RAID 1+0, combines disk mirroring and disk striping to protect data.
RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID set before any data is lost.
Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM.
The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological risks across the enterprise.
Autoclassification is an intelligent technology found in some content management systems (CMS) wherein documents are scanned and automatically assigned categories and keywords based on the content within the documents.
A Certified Information Systems Risk and Compliance Professional (CISRCP) is a person in the information technology (IT) field that has passed an examination on risk and compliance topics developed by the International Association of Risk and Compliance Professionals (IARCP).