Browse Definitions:
9 results for:

PNG file

PNG (Portable Network Graphics)

Definition | SearchMicroservices

PNG (pronounced ping as in ping-pong; for Portable Network Graphics) is a file format for image compression that, in time, is expected to replace the...


Definition |

An image is a picture that has been created or copied and stored in electronic form. Common formats that are supported online include JPEG, GIF, BMP ...

virtual printer

Definition |

A virtual printer is an application that replicates the software interface for a physical printer to facilitate various tasks without actually ...

JPEG (Joint Photographic Experts Group)

Definition | SearchMicroservices

JPEG (Joint Photographic Experts Group) is an ISO/IEC group of experts that develops and maintains standards for a suite of compression algorithms ...

image compression

Definition |

Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level.

Adobe Flash Player

Definition | SearchCIO

Adobe Flash Player is software used to stream and view video, audio and multimedia and Rich Internet Applications (RIA) on a computer or supported ...

GIF (Graphics Interchange Format)

Definition | SearchWinDevelopment

The GIF (pronounced DJIF by many, including its designer; pronounced GIF with a hard G by many others) stands for Graphics Interchange Format and is ...


Definition |

Stegano is a malware toolkit that allows users to hide malicious code in images. The kit’s name comes from steganography, which is a method of ...

data compression

Definition | SearchStorage

Data compression is a reduction in the number of bits needed to represent data.



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...

  • NetApp SolidFire

    NetApp SolidFire is a business division of NetApp Inc. that specializes in all-flash storage systems.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.