Browse Definitions:
216 results for:


HTTP (Hypertext Transfer Protocol)

Definition | searchWinDevelopment

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the...

S-HTTP (Secure HTTP)

Definition | SearchSoftwareQuality

S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.


Definition | SearchMobileComputing

RPC over HTTP (Remote Procedure Call over HTTP) is a protocol that allows a client on the Internet to connect securely to a Microsoft Exchange Server...

HTTPS (HTTP over SSL or HTTP Secure)

Definition | SearchSoftwareQuality

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP ...

MAPI over HTTP (Messaging Application Programming Interface over HTTP)

Definition | SearchExchange

MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.

HTTP 1.1

Definition | SearchMicroservices

HTTP 1.1 is the latest version of Hypertext Transfer Protocol (HTTP), the World Wide Web application protocol that runs on top of the Internet's TCP/...

Apache HTTP server project

Definition |

The Apache HTTP server project is a collaborative open source Web server development initiative. The project is spearheaded by the Apache Server ...

persistent connection (HTTP persistent connection)

Definition |

A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses ...

weights and measures

Definition |

Common equivalent weights and measures (http://physics.


Definition |

SafeSquid is an HTTP 1.1 content filtering proxy server.



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...

  • NetApp SolidFire

    NetApp SolidFire is a business division of NetApp Inc. that specializes in all-flash storage systems.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.