Browse Definitions :

Browse Definitions by Alphabet

ASS - AUD

  • association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
  • association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
  • ASSP - In computers, an ASSP (application-specific standard product) is a semiconductor device integrated circuit (IC) product that is dedicated to a specific application market and sold to more than one user (and thus, "standard").
  • ASSP (application-specific standard product) - In computers, an ASSP (application-specific standard product) is a semiconductor device integrated circuit (IC) product that is dedicated to a specific application market and sold to more than one user (and thus, "standard").
  • AST - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • ASTM International - ASTM International is a voluntary standards development organization whose work covers 15 industries, ranging from energy to chemicals to medical devices.
  • astronomical unit - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • astronomical unit (AU) - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • astroturf marketing - Astroturfing is the artificial creation of a grassroots buzz for a product, service or political viewpoint.
  • astroturfing - Astroturfing is the artificial creation of a grassroots buzz for a product, service or political viewpoint.
  • ASUG - ASUG (Americas' SAP Users' Group), founded in 1990, is the largest independent non-profit organization worldwide for users of products from SAP, which supplies enterprise resource management systems to the large enterprise.
  • asymmetric - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
  • asymmetric algorithm - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • asymmetric communication - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
  • asymmetric communications - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
  • asymmetric cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • asymmetric cryptography (public key cryptography) - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • asymmetric cyber attack - An asymmetric cyber attack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure.
  • Asymmetric Digital Subscriber Line - ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.
  • Asymmetric DSL - ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.
  • Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.
  • asynchronous groupware - Synchronous groupware is programming that enables real-time collaboration among geographically-distributed work group members.
  • Asynchronous JavaScript and XML - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
  • asynchronous transfer mode - ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.
  • AT Attachment Packet Interface - ATAPI (AT Attachment Packet Interface) is an interface between your computer and attached CD-ROM drives and tape backup drives.
  • at sign - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • AT&T Synaptic Compute as a Service - AT&T Synaptic Compute as a Service is an infrastructure as a service (IaaS) offering that allows software developers and business customers to access virtualized servers in an AT&T data center on a pay-per-use basis.
  • AT&T Toggle - Toggle is an AT&T service that allows a smartphone owner to create separate personal and business environments on the same mobile device.
  • ATA - ATA (Advanced Technology Attachment) is the official name that American National Standards Institute group X3T10 uses for what the computer industry calls Integrated Drive Electronics (IDE).
  • ATA - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • ATA - American Telemedicine Association (ATA) is a non-profit organization that strives to promote telemedicine (medical care delivered through the use of telecommunications technology).
  • ATA over Ethernet - ATA over Ethernet (AoE) is an open source network protocol designed to connect storage devices and servers in a storage area network (SAN).
  • ATAPI - ATAPI (AT Attachment Packet Interface) is an interface between your computer and attached CD-ROM drives and tape backup drives.
  • ATAPI (AT Attachment Packet Interface) - ATAPI (AT Attachment Packet Interface) is an interface between your computer and attached CD-ROM drives and tape backup drives.
  • ATE - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • athenahealth Inc. - athenahealth Inc.
  • ATL - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • Atlantis Computing - Atlantis Computing is a hyper-converged infrastructure (HCI) software and hardware vendor.
  • ATM - ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.
  • ATM black box attack - An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes into the top of the cash machine to gain access to its internal infrastructure.
  • ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
  • Atom - Atom is an XML -based file format used to syndicate content.
  • atom - An atom is a particle of matter that uniquely defines achemical element.
  • atomic - In ancient philosophy, an atom was the ultimate unit of matter on which more complex views of material reality were based.
  • atomic clock - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic data - Raw data (sometimes called source data, atomic data or primary data) is data that has not been processed for use.
  • atomic data - In a data warehouse, atomic data is the lowest level of detail.
  • atomic force microscopy - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic force microscopy (AFM) - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic mass unit - An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12.
  • atomic mass unit (AMU or amu) - An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12.
  • atomic memory - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomic storage - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomicity - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • atomicity consistency isolation durability - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • atomicity, consistency, isolation, and durability - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ATRN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • ATS - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • ATSC - The Advanced Television Systems Committee (ATSC) is a standards organization that was created in 1982 as part of the Advanced Television Committee (ATV) to promote the establishment of technical standards for all aspects of advanced television systems.
  • attachment unit interface - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • attack kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • attack surface - An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit.
  • attack surface analysis - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering.
  • attack vector - An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • attention management - Attention management is an area of endeavor seeking to optimize the way people allocate their limited capacity for focused mental engagement.
  • attention minute - The attention minute is a metric used to determine how much time a user is actually engaged with content.
  • attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
  • attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
  • attenuation-to-crosstalk ratio - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • attribute - In general, an attribute is a property or characteristic.
  • ATU R - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATU-R - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATV - ATV (Advanced Television) is the name given by the U.
  • ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
  • ATVEF - The Advanced Television Enhancement Forum (ATVEF) is an alliance of leaders in the broadcast and cable industry, the consumer electronics industry, and the computer industry that developed the ATVEF enhanced content specification.
  • ATX - ATX is an industry-wide specification for a desktop computer's motherboard.
  • AU - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • audio - Audio is sound within the acoustic range available to humans.
  • audio content - Audio content is any type of published material or information that is consumed through listening.
  • Audio Engineering Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society/European Broadcasting Union (AES/EBU) - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • audio frequency - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • Audio Interchange File Format - AIFF (Audio Interchange File Format) is one of the two most-used audio file formats used in the Apple Macintosh operating system.
  • audio introduction - This page provides a brief overview of audio and its production for computer users.
  • Audio Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio spotlight - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
  • Audio stream input output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • Audio Stream Input/Output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • audio video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Audio Video Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio Visual Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio/Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio/video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close