Browse Definitions :
  • May 31, 2010 31 May'10

    VoIP Learning Guides

    We've gathered a collection of our learning guides and tutorials on VoIP-related topics. You'll find learning guides about VoIP deployment and administration, security, performance, ROI and more. Then see, below, our VoIP quizzes and cheat sheets ...  Continue Reading

  • May 31, 2010 31 May'10

    iSeries Learning Guides

    We've gathered a collection of our learning guides and tutorials on iSeries-related topics. You'll find learning guides about administration, autonomic computing, security, printing, error messages and more.  Continue Reading

  • May 31, 2010 31 May'10

    SAP Quizzes

    We've gathered a collection of our quizzes about SAP-related topics. You'll find quizzes about ERP, SCM, BI, Business Warehouse, Basis and more. Then see, below, our our larger collection of learning resources.  Continue Reading

  • May 31, 2010 31 May'10

    SAP Learning Guides

    We've gathered a collection of our learning guides and tutorials on SAP-related topics. You'll find learning guides about ERP, SCM, BI, Business Warehouse, Basis and more. Then see, below, our SAP quizzes and cheat sheets and our larger collection ...  Continue Reading

  • May 31, 2010 31 May'10

    Global Network Enterprise Construct (GNEC)

    The Global Network Enterprise Construct (GNEC) is a strategy to move the U.S. Army's many loosely-affiliated independent networks into five standardized, secure network hubs called network service centers (NSCs).  Continue Reading

  • May 31, 2010 31 May'10

    iSeries Quizzes

    We've gathered a collection of our iSeries quizzes. You'll find quizzes about basic concepts, commands, administration, vocabulary, backup and recovery. Then see, below, our iSeries learning guides and cheat sheets and our larger collection of ...  Continue Reading

  • May 27, 2010 27 May'10

    federal portfolio management

    Federal portfolio management is a methodology used by the Chief Information Officers (CIOs) of U.S. government agencies to manage their organizations' IT projects, resources and investments in an effort to maximize resources, minimize costs, deliver...  Continue Reading

  • May 26, 2010 26 May'10

    rugged IT

    Rugged IT is a marketing term for hardware that is designed to operate in extremely harsh environments and conditions.  Continue Reading

  • May 24, 2010 24 May'10

    Ajax Cheat Sheets

    We've gathered cheat sheets for fast reference to Ajax-related information. You'll find information about Prototype, code packages, scriptaculous and more.  Continue Reading

  • May 21, 2010 21 May'10

    Peppermint

    Peppermint is a lightweight open source operating system that is optimized for cloud computing and Web-based applications.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close