Browse Definitions :
12,115 results for:


Definition | SearchNetworking

In a computer operating system, a path is the route through a file system to a particular file.

network analyzer (protocol analyzer or packet analyzer)

Definition | SearchNetworking

A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer ...

pulse code modulation (PCM)

Definition | SearchNetworking

Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.

network configuration management (NCM)

Definition | SearchNetworking

Network configuration management is the process of organizing and maintaining information about all the components of a computer network.

VoIP caller ID (Voice over Internet Protocol caller identification)

Definition | SearchUnifiedCommunications

VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as ...

data transfer rate (DTR)

Definition | SearchUnifiedCommunications

Definition: data transfer rate (DTR) is the amount of digital data that is moved from one place to another in a given time.

find me / follow me

Definition | SearchUnifiedCommunications

Find me and follow me are two call forwarding services that are commonly used in conjunction with each other... (Continued)

virtual phone number

Definition | SearchUnifiedCommunications

A virtual phone number is a telephone number is used to route calls to the user's actual phone number or numbers.

ZRTP (Zimmermann Real-Time Transport Protocol)

Definition | SearchUnifiedCommunications

ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications ...

network hub

Definition | SearchNetworking

A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.



  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...


  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...


  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...


  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...


  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...