Browse Definitions :

Browse Definitions by Alphabet

AUF - AUT

  • AUFS (Advanced Multi-Layered Unification Filesystem) - Advanced multi-layered unification filesystem (AUFS) is a union filesystem sometimes used in platform-as-a-service environments to merge distinct directory hierarchies into a single directory.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.
  • augmented learning - Augmented learning (AL) is the use of real-life experiences, objects and elements that have been recreated on a computer or mobile device to enhance specific educational concepts.
  • augmented memory - Augmented memory is the practice of artificially increasing a person's ability to produce long term memories and retain information.
  • augmented reality - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • Augusta Ada King - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • AUI - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUP - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticate - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authenticated e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • Authenticated TURN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authentication authorization accounting - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authentication authorization accounting - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • authentication factor - An authentication factor is a category of credential used for identity verification.
  • authentication server - An authentication server is an application that facilitates authentication of an entity that attempts to access a network.
  • authentication ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication ticket or ticket-granting ticket (TGT) - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
  • authorization - Authorization is the process of giving someone permission to do or have something.
  • authorized program analysis report - An APAR (authorized program analysis report) is a term used in IBM for a description of a problem with an IBM program that is formally tracked until a solution is provided.
  • authorized service provider (ASP) - An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.
  • auto 3 D - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • auto 3-D - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • auto 3-D (autostereoscopic imaging) - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • auto-correct fail (auto-correct error) - An auto-correct fail is an error created when the software created to detect and correct misspelled words replaces a user-generated mistake with a different, and possibly worse, error.
  • auto-provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • auto-storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • autoblog - An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds.
  • autoclassification - Autoclassification is an intelligent technology found in some content management systems (CMS) wherein documents are scanned and automatically assigned categories and keywords based on the content within the documents.
  • Autodesk Constructware - Constructware is Autodesk's Web-based project management tool that connects different business operations and information in order to standardize business processes.
  • autodialer - An autodialer is a software program that automatically dials telephone numbers from a list or a database.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • autoloader - A stackloader (also known as an autoloader) is a tape storage device that automatically loads tape cartridges using a robotic mechanism.
  • Automated Best Value System - Automated Best Value System is a calculated formula that assesses past performance based on quality, delivery and packaging performance.
  • Automated Clearing House - Automated Clearing House (ACH) is a secure payment transfer system that connects all U.
  • Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the Automated Clearing House financial transaction network.
  • automated data tiering - Automated data tiering is a type of software program that moves data files, volumes or blocks between tiered storage according to company-defined policy.
  • Automated Fingerprint Identification System - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • Automated Fingerprint Identification System (AFIS) - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • Automated Insights - Automated Insights is a company that makes artificial intelligence (AI) applications that can understand statistical, numeric and graphed data and present it in an articulate and understandable written format.
  • Automated License Plate Recognition - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • automated machine learning (AutoML) - Automated machine learning is the process of applying machine learning models to real-world problems using automation.
  • automated meter reading - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated meter reading (AMR) - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated provisioning - Automated provisioning is the ability to deploy an information technology or telecommunications service by using predefined procedures that are carried out electronically without requiring human intervention.
  • automated reasoning - Automated reasoning is the area of computer science that is concerned with applying reasoning in the form of logic to computing systems.
  • automated speech recognition - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated speech recognition (ASR) - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated storage tiering - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storage tiering (AST) - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storytelling - Automated storytelling is a process involving the use of artificial intelligence (AI) to create written stories.
  • automated tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • automated test equipment - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated test equipment (ATE) - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • Automatic Call Distributor - An Automatic Call Distributor (ACD) is a telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions.
  • Automatic Coin Telephone System - ACTS (Automatic Coin Telephone System) is a public coin-operated telephone service that completes a variety of phone calls, times the calls, and collects payment without the aid of an operator.
  • automatic content classification - Automatic content classification is a process for managing text and unstructured information by categorizing or clustering text.
  • Automatic Data Processing Inc. (ADP) - Automatic Data Processing Inc.
  • Automatic Identification and Data Capture - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Number Identification - ANI (Automatic Number Identification) is a service that provides the receiver of a telephone call with the number of the calling phone.
  • Automatic Private IP Addressing - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • automatic repeat request - Automatic repeat request (ARQ) is a protocol for error control in data transmission.
  • automatic storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
  • automatic vehicle locator - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automotive IT - Automotive IT is any hardware or software designed to augment and support the experience of operating a motor vehicle.
  • automotive subscription plan - An automotive subscription plan is a service that offers use of a motor vehicle to a driver for a monthly subscription fee.
  • autonomic computing - Autonomic computing is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system.
  • autonomous business process (ABP) - Autonomous Business Process (ABP) utilizes intelligent software agents to discover existing business processes to optimize their efficiency and performance.
  • autonomous robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • autonomous ship - An autonomous ship is a water craft piloted by artificial intelligence (AI).
  • autonomous system - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autonomous transaction - In Oracle's database products, an autonomous transaction is an independent transaction that is initiated by another transaction.
  • autonomy as a service - Autonomy as a service is the offering of automated, fully unmanned systems by a service provider.
  • AutoPlay - AutoRun is a feature of the Windows operating system that causes predetermined actions when certain media is inserted.
  • autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
  • AutoRABIT - AutoRABIT is an end-to-end release management suite specifically aimed at streamlining the development and release of Salesforce.
  • autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
  • autostereoscopic imaging - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • autotrunking - Autotrunking is a function that can be activated for one or more switch ports in a Cisco system of virtual local area networks (VLANs), making those ports capable of carrying traffic for any or all of the VLANs accessible by a particular switch.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close