Browse Definitions :

Browse Definitions by Alphabet

AU - AUT

  • AU - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • audio - Audio is sound within the acoustic range available to humans.
  • audio content - Audio content is any type of published material or information that is consumed through listening.
  • Audio Engineering Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society/European Broadcasting Union (AES/EBU) - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • audio frequency - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • Audio Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • Audio stream input output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • Audio Stream Input/Output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • audio video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Audio Video Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio Visual Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio/Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio/video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • AUFS (Advanced Multi-Layered Unification Filesystem) - Advanced multi-layered unification filesystem (AUFS) is a union filesystem sometimes used in platform-as-a-service environments to merge distinct directory hierarchies into a single directory.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.
  • augmented learning - Augmented learning (AL) is the use of real-life experiences, objects and elements that have been recreated on a computer or mobile device to enhance specific educational concepts.
  • augmented memory - Augmented memory is the practice of artificially increasing a person's ability to produce long term memories and retain information.
  • augmented reality - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • Augusta Ada King - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • AUP - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticate - Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.
  • authenticated e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • Authenticated TURN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.
  • authentication authorization accounting - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authentication authorization accounting - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • authentication factor - An authentication factor is a category of credential used for identity verification.
  • authentication server - An authentication server is an application that facilitates authentication of an entity that attempts to access a network.
  • authentication ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication ticket or ticket-granting ticket (TGT) - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication token - A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a login process.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
  • authorization - Authorization is the process of giving someone permission to do or have something.
  • authorized service provider (ASP) - An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • auto-provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • auto-storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • autoblog - An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds.
  • autoclassification - Autoclassification is an intelligent technology found in some content management systems (CMS) wherein documents are scanned and automatically assigned categories and keywords based on the content within the documents.
  • autodialer - An autodialer is a software program that automatically dials telephone numbers from a list or a database.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the Automated Clearing House financial transaction network.
  • Automated Fingerprint Identification System - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • Automated Fingerprint Identification System (AFIS) - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • Automated Insights - Automated Insights is a company that makes artificial intelligence (AI) applications that can understand statistical, numeric and graphed data and present it in an articulate and understandable written format.
  • Automated License Plate Recognition - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • automated machine learning (AutoML) - Automated machine learning is the process of applying machine learning models to real-world problems using automation.
  • automated meter reading - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated meter reading (AMR) - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated provisioning - Automated provisioning is the ability to deploy an information technology or telecommunications service by using predefined procedures that are carried out electronically without requiring human intervention.
  • automated reasoning - Automated reasoning is the area of computer science that is concerned with applying reasoning in the form of logic to computing systems.
  • automated speech recognition - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated speech recognition (ASR) - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated storage tiering - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storage tiering (AST) - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storytelling - Automated storytelling is a process involving the use of artificial intelligence (AI) to create written stories.
  • automated tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • automated test equipment - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated test equipment (ATE) - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • automatic content classification - Automatic content classification is a process for managing text and unstructured information by categorizing or clustering text.
  • Automatic Data Processing Inc. (ADP) - Automatic Data Processing Inc.
  • Automatic Identification and Data Capture - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Private IP Addressing - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • automatic storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
  • automatic vehicle locator - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automotive IT - Automotive IT is any hardware or software designed to augment and support the experience of operating a motor vehicle.
  • automotive subscription plan - An automotive subscription plan is a service that offers use of a motor vehicle to a driver for a monthly subscription fee.
  • autonomic computing - Autonomic computing is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system.
  • autonomous business process (ABP) - Autonomous Business Process (ABP) utilizes intelligent software agents to discover existing business processes to optimize their efficiency and performance.
  • autonomous robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • autonomous ship - An autonomous ship is a water craft piloted by artificial intelligence (AI).
  • autonomous system - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autonomous transaction - In Oracle's database products, an autonomous transaction is an independent transaction that is initiated by another transaction.
  • autonomy as a service - Autonomy as a service is the offering of automated, fully unmanned systems by a service provider.
  • autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
  • AutoRABIT - AutoRABIT is an end-to-end release management suite specifically aimed at streamlining the development and release of Salesforce.
  • autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
  • autotrunking - Autotrunking is a function that can be activated for one or more switch ports in a Cisco system of virtual local area networks (VLANs), making those ports capable of carrying traffic for any or all of the VLANs accessible by a particular switch.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close