Browse Definitions :
  • January 27, 2006 27 Jan'06

    Bayesian logic

    Named for Thomas Bayes, an English clergyman and mathematician, Bayesian logic is a branch of logic applied to decision making and inferential statistics that deals with probability inference: using the knowledge of prior events to predict future ...  Continue Reading

  • January 20, 2006 20 Jan'06

    bulk data transfer

    Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.  Continue Reading

  • January 16, 2006 16 Jan'06

    Financial Services Markup Language (FSML)

    FSML (Financial Services Markup Language) is a data description language based on the Standard Generalized Markup Language (SGML) that was developed to create financial documents for delivery over the Internet, including eCheck and their associated ...  Continue Reading

  • January 09, 2006 09 Jan'06

    IIOP (Internet Inter-ORB Protocol)

    IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.  Continue Reading

  • January 03, 2006 03 Jan'06

    rich client

    A rich client is a networked computer that has some resources installed locally but also depends on other resources distributed over the network. The rich client's configuration is somewhere between that of a thin client, which relies largely upon ...  Continue Reading

  • January 03, 2006 03 Jan'06

    fat client (thick client)

    A fat client (sometimes called a thick client) is a networked computer with most resources installed locally, rather than distributed over a network as is the case with a thin client.  Continue Reading

  • January 02, 2006 02 Jan'06

    co-branding

    Co-branding is the practice of using multiple brand names together on a single product or service.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close