Browse Definitions :

Browse Definitions by Alphabet

ATO - AUT

  • Atom - Atom is an XML -based file format used to syndicate content.
  • atom - An atom is a particle of matter that uniquely defines achemical element.
  • Atom (XML) - Atom is an XML -based file format used to syndicate content.
  • atomic - In ancient philosophy, an atom was the ultimate unit of matter on which more complex views of material reality were based.
  • atomic clock - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic data - Raw data (sometimes called source data or atomic data) is data that has not been processed for meaningful use.
  • atomic data - In a data warehouse, atomic data is the lowest level of detail.
  • atomic force microscopy - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic force microscopy (AFM) - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic mass unit - An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12.
  • atomic mass unit (AMU or amu) - An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12.
  • atomic memory - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomic storage - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomic storage (atomic memory) - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomicity - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • atomicity consistency isolation durability - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • atomicity, consistency, isolation, and durability - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ATRN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • ATS - An applicant tracking system (ATS) manages the recruiting and hiring process, including job postings and job applications.
  • ATSC - The Advanced Television Systems Committee (ATSC) is a standards organization that was created in 1982 as part of the Advanced Television Committee (ATV) to promote the establishment of technical standards for all aspects of advanced television systems.
  • attachment unit interface - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • attack kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • attack surface - An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit.
  • attack surface analysis - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering.
  • attack vector - An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome.
  • attempt - In a telecommunications system, an attempt is a user request to get connected to the system or to initiate a call, whether or not the connection is made or the call is initiated.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • attention management - Attention management is an area of endeavor seeking to optimize the way people allocate their limited capacity for focused mental engagement.
  • attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
  • attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
  • attenuation-to-crosstalk ratio - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • attenuation-to-crosstalk ratio (ACR) or headroom - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • attosecond - An attosecond is one quintillionth (10 -18) of a second and is a term used in photon research.
  • attribute - In general, an attribute is a property or characteristic.
  • ATU R - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATU-R - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATU-R (ADSL Terminal Unit - Remote) - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATV - ATV (Advanced Television) is the name given by the U.
  • ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
  • ATX - ATX is an industry-wide specification for a desktop computer's motherboard.
  • AU - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • audible ring - In a telephone system, an audible ring is the tone that is returned from the called party's switching device and heard by the caller.
  • audio - Audio is sound within the acoustic range available to humans.
  • audio content - Audio content is any type of published material or information that is consumed through listening.
  • Audio Engineering Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society/European Broadcasting Union (AES/EBU) - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • audio frequency - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • Audio Interchange File Format - AIFF (Audio Interchange File Format) is one of the two most-used audio file formats used in the Apple Macintosh operating system.
  • audio introduction - This page provides a brief overview of audio and its production for computer users.
  • Audio Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio noise - In audio, noise is generally any unpleasant sound and, more technically, any unwanted sound that is unintentionally added to a desired sound.
  • audio spotlight - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
  • Audio stream input output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • Audio Stream Input/Output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • audio video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Audio Video Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio Visual Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio/Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio/video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Audiobook: Intrusion Prevention Fundamentals - Intrusion Prevention Fundamentals: An introduction to network attack mitigation with IPS.
  • audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • audit trail - In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries.
  • auditor - In Web advertising, this usually means a third-party company that audits the number of visitors to or impression sent from a Web site during some time period.
  • AUFS (Advanced Multi-Layered Unification Filesystem) - Advanced multi-layered unification filesystem (AUFS) is a union filesystem sometimes used in platform-as-a-service environments to merge distinct directory hierarchies into a single directory.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.
  • augmented learning - Augmented learning (AL) is the use of real-life experiences, objects and elements that have been recreated on a computer or mobile device to enhance specific educational concepts.
  • augmented memory - Augmented memory is the practice of artificially increasing a person's ability to produce long term memories and retain information.
  • augmented reality - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • Augusta Ada King - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • AUI - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUI (attachment unit interface) - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUP - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticate - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authenticated e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • Authenticated TURN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authentication authorization accounting - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authentication authorization accounting - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • authentication factor - An authentication factor is a category of credential used for identity verification.
  • authentication server - An authentication server is an application that facilitates authentication of an entity that attempts to access a network.
  • authentication ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication ticket or ticket-granting ticket (TGT) - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
  • authorization - Authorization is the process of giving someone permission to do or have something.
  • authorized program analysis report - An APAR (authorized program analysis report) is a term used in IBM for a description of a problem with an IBM program that is formally tracked until a solution is provided.
  • authorized program analysis report (APAR) - An APAR (authorized program analysis report) is a term used in IBM for a description of a problem with an IBM program that is formally tracked until a solution is provided.

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close