Browse Definitions :

Word of the Day

Data Transfer Project

Data Transfer Project (DTP) is an open source initiative to facilitate customer-controlled data transfers between two online services. The project is a collaborative effort run by Facebook, Twitter, Apple, Google and Microsoft.See More

Newest and Updated Terms

Buzzword Alert

Alibaba

Alibaba Group Holding Limited is a Chinese business conglomerate that runs one of the largest online e-commerce sites in the world, Alibaba.com.

Read More

Know-IT-All

Essential Knowledge

Compare 3 DDoS mitigation strategies for enterprise networks

Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service.

Cloud security vs. network security: What's the difference?

While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more.

Network security in 2020 highlights zero trust, SD-branch

In this roundup of networking blogs, experts explore various aspects of network security -- from old and evergreen to new and innovative -- and the ...

The future of VPNs in a post-pandemic world

Pre-pandemic, many experts touted VPN's demise. During the pandemic, VPNs became lifelines for remote workers to do their jobs. Here's what the ...

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • zero-day (computer)

    Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close