Browse Definitions :
  • November 23, 2009 23 Nov'09

    Fast Guide to Pandemic Planning

    Pandemic planning requires an organization to anticipate a situation where a large part of the workforce is out sick.  Continue Reading

  • November 17, 2009 17 Nov'09

    backscatter spam

    Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender...  Continue Reading

  • November 16, 2009 16 Nov'09

    Vouch by Reference (VBR)

    Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info.  Continue Reading

  • November 05, 2009 05 Nov'09

    paradox

    A paradox is a statement or concept that contains conflicting ideas.  Continue Reading

  • November 03, 2009 03 Nov'09

    PayPhrase

    Amazon's PayPhrase is an Internet point-of-sale (POS) shortcut that allows Amazon customers to use their Amazon payment and shipping authorization credentials while shopping at third-party partner sites.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close