Browse Definitions :

Browse Definitions by Alphabet

AWS - WIR

  • AWS Storage Gateway (Amazon Web Services Storage Gateway) - AWS Storage Gateway securely transfers application data between on-premises software and cloud-based storage to improve application scalability and help an enterprise save costs.
  • AWS Support (Amazon Web Services Support) - AWS Support provides advice and tools for developers in the AWS cloud.
  • AWS Test Drive - The AWS Test Drive is a free Amazon Web Services tool that allows consulting and technology partners to test third-party software environments.
  • AWS Trusted Advisor (Amazon Web Services Trusted Advisor) - AWS Trusted Advisor is a product that allows a cloud administrator to provision Amazon Web Services resources according to best practices in four categories: cost optimization, security, fault tolerance and performance improvement.
  • AWS Web Application Firewall (AWS WAF) - AWS Web Application Firewall (WAF) is a security system that controls incoming and outgoing traffic for applications and websites based in the Amazon Web Services public cloud.
  • AWS X-Ray - AWS X-Ray is an application performance management service that enables a developer to analyze and debug applications in the Amazon Web Services (AWS) public cloud.
  • AWT - Abstract Window Toolkit (AWT) is a set of application program interfaces (APIs) used by Java programmers to create graphical user interface (GUI) objects, such as buttons, scroll bars, and windows.
  • AXT - Alien crosstalk (AXT) is electromagnetic noise that can occur in a cable that runs alongside one or more other signal-carrying cables.
  • azimuth and elevation - Azimuth and elevation are angles used to define the apparent position of an object in the sky, relative to a specific observation point.
  • Azure Bot Service - Azure Bot Service is Microsoft’s artificial intelligence (AI) chatbot offered as a service on the Azure cloud service marketplace.
  • Azure Container Instances - Azure Container Instances is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.
  • Azure Cost Management by Cloudyn - Azure Cost Management by Cloudyn is a software as a service (SaaS) cost management and monitoring tool for multi-cloud environments.
  • Azure Data Studio (formerly SQL Operations Studio) - Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.
  • Azure DevOps (formerly Visual Studio Team Services) - Visual Studio Team Services (VSTS) -- rebranded as Azure DevOps in 2018 -- is an Azure cloud-hosted extension of Microsoft's Team Foundation Server (TFS) -- now called Azure DvOps -- that assist development teams with special tools and services for software programmers, analysts and testers as well as IT project or team managers.
  • Azure HDInsight - Azure HDInsight is a cloud-based service from Microsoft for big data analytics that helps organizations process large amounts of streaming or historical data.
  • Azure Kubernetes Service (AKS) - Azure Kubernetes Service (AKS) is a managed container orchestration service based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.
  • Azure Migrate - Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.
  • Azure Notification Hubs - Azure Notification Hubs are push notification engines designed to update users with alerts about new content for a given site, service or app.
  • Azure Quantum - Azure Quantum is a full-stack cloud service designed to allow users remote access to quantum computers.
  • Azure Reserved Virtual Machine Instances - Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.
  • Azure Service Fabric - Azure Service Fabric is a Platform as a Service (PaaS) offering designed to facilitate the development, deployment and management of highly-scalable and customizable applications for the Microsoft Azure cloud platform.
  • Azure SQL Data Warehouse - Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare) - The Patient Protection and Affordable Care Act (more commonly referred to as the Affordable Care Act, ACA or Obamacare) is a healthcare law passed by Congress in 2010 during the administration of President Barack Obama.
  • SAP Ariba - SAP Ariba is a software company that provides cloud-based procurement, spend management and supply chain services that enable suppliers and buyers to connect and do business globally.
  • voice authentication - Voice authentication is a biometric method of speaker recognition based on measuring the distinctions in individual voices to uniquely identify users.
  • What is artificial intelligence (AI)? - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • wireless access point - A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN).
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close