Browse Definitions:
90 results for:

spreadsheet

desktop search (integrated search)

Definition | SearchEnterpriseDesktop

Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.

courseware

Definition | WhatIs.com

Courseware is educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer.

financial analytics

Definition | SearchFinancialApplications

Financial analytics is the creation of ad hoc analysis to answer specific business questions and forecast possible future financial scenarios.

Microsoft PowerPivot

Definition | SearchSQLServer

PowerPivot is a free Microsoft Excel tool that increases the capabilities of Excel's pre-existing pivot table tool by allowing users to import data ...

CAIQ (Consensus Assessments Initiative Questionnaire)

Definition | SearchCloudSecurity

The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors ...

esxtop

Definition | SearchVMware

Esxtop is a command-line tool that gives you real-time information on resource usage in your vSphere environment.

BIRT (Business Intelligence and Reporting Tools)

Definition | SearchBusinessAnalytics

BIRT (Business Intelligence and Reporting Tools) is an open source technology platform sponsored by the Eclipse Foundation that consists of a visual ...

VMware vSphere Security Hardening Guide

Definition | SearchVMware

The VMware vSphere Security Hardening Guide is an Excel document provided by VMware that lists more than 150 recommendations to systems ...

Loggly

Definition | SearchITOperations

Loggly is a cloud-based enterprise log management and analytics tool. The Software as a Service product makes log data accessible and useful to more ...

records management

Definition | SearchCompliance

Records management (RM) is the administration of records and documented information for the entirety of its lifecycle, which includes creation, ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • unified storage (multiprotocol storage)

    Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that runs and manages...

  • I/O virtualization (IOV)

    I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from...

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close