Browse Definitions :

Browse Definitions by Alphabet

ATH - AUT

  • Athlon - Athlon, a popular microprocessor from AMD that is used in many personal computers, was the first processor to be shipped in a 1 gigahertz (one billion clock speed) version.
  • ATL - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • Atlantis Computing - Atlantis Computing is a hyper-converged infrastructure (HCI) software and hardware vendor.
  • Atlas - Atlas was the codename for a free Web client framework, created by Microsoft, that simplifies the creation of sites by integrating client script libraries with the rich, server-based platform of ASP.
  • ATM - ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.
  • ATM (asynchronous transfer mode) - ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.
  • ATM black box attack - An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes into the top of the cash machine to gain access to its internal infrastructure.
  • ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
  • Atom - Atom is an XML -based file format used to syndicate content.
  • atom - An atom is a particle of matter that uniquely defines achemical element.
  • Atom (XML) - Atom is an XML -based file format used to syndicate content.
  • atomic - In ancient philosophy, an atom was the ultimate unit of matter on which more complex views of material reality were based.
  • atomic clock - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic data - Raw data (sometimes called source data or atomic data) is data that has not been processed for meaningful use.
  • atomic data - In a data warehouse, atomic data is the lowest level of detail.
  • atomic force microscopy - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic force microscopy (AFM) - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic mass unit - An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12.
  • atomic mass unit (AMU or amu) - An atomic mass unit (symbolized AMU or amu) is defined as precisely 1/12 the mass of an atom of carbon-12.
  • atomic memory - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomic storage - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomic storage (atomic memory) - Atomic storage (sometimes called atomic memory) is a nanotechnology approach to computer data storage that works with bits and atoms on the individual level.
  • atomicity - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • atomicity consistency isolation durability - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • atomicity, consistency, isolation, and durability - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ATRN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • ATS - An applicant tracking system (ATS) manages the recruiting and hiring process, including job postings and job applications.
  • ATSC - The Advanced Television Systems Committee (ATSC) is a standards organization that was created in 1982 as part of the Advanced Television Committee (ATV) to promote the establishment of technical standards for all aspects of advanced television systems.
  • attachment unit interface - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • attack kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • attack surface - An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit.
  • attack surface analysis - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering.
  • attack vector - An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome.
  • attempt - In a telecommunications system, an attempt is a user request to get connected to the system or to initiate a call, whether or not the connection is made or the call is initiated.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • attention management - Attention management is an area of endeavor seeking to optimize the way people allocate their limited capacity for focused mental engagement.
  • attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
  • attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
  • attenuation-to-crosstalk ratio - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • attenuation-to-crosstalk ratio (ACR) or headroom - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • attosecond - An attosecond is one quintillionth (10 -18) of a second and is a term used in photon research.
  • attribute - In general, an attribute is a property or characteristic.
  • ATU R - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATU-R - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATU-R (ADSL Terminal Unit - Remote) - An ATU-R (ADSL Terminal Unit - Remote), sometimes called an "ADSL modem," is a hardware unit that is installed in any computer that uses a telephone company connection with Asymmetric Digital Subscriber Line (ADSL) service.
  • ATV - ATV (Advanced Television) is the name given by the U.
  • ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
  • ATX - ATX is an industry-wide specification for a desktop computer's motherboard.
  • AU - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • audible ring - In a telephone system, an audible ring is the tone that is returned from the called party's switching device and heard by the caller.
  • audio - Audio is sound within the acoustic range available to humans.
  • audio content - Audio content is any type of published material or information that is consumed through listening.
  • Audio Engineering Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • Audio Engineers Society/European Broadcasting Union (AES/EBU) - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • audio frequency - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • Audio Interchange File Format - AIFF (Audio Interchange File Format) is one of the two most-used audio file formats used in the Apple Macintosh operating system.
  • audio introduction - This page provides a brief overview of audio and its production for computer users.
  • Audio Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio noise - In audio, noise is generally any unpleasant sound and, more technically, any unwanted sound that is unintentionally added to a desired sound.
  • audio spotlight - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
  • Audio stream input output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • Audio Stream Input/Output - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • audio video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Audio Video Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio Visual Interleaved file - An AVI (Audio Video Interleaved) file is a sound and motion picture file that conforms to the Microsoft Windows Resource Interchange File Format (RIFF) specification.
  • Audio/Modem Riser - AMR (Audio/Modem Riser) is a specification developed by Intel for packaging the analog I/O audio functions of modem circuitry together with a codec chip (which converts back and forth from analog to digital) on a small board that plugs directly into a computer's motherboard.
  • audio/video - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Audiobook: Intrusion Prevention Fundamentals - Intrusion Prevention Fundamentals: An introduction to network attack mitigation with IPS.
  • audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • audit trail - In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries.
  • auditor - In Web advertising, this usually means a third-party company that audits the number of visitors to or impression sent from a Web site during some time period.
  • AUFS (Advanced Multi-Layered Unification Filesystem) - Advanced multi-layered unification filesystem (AUFS) is a union filesystem sometimes used in platform-as-a-service environments to merge distinct directory hierarchies into a single directory.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.
  • augmented learning - Augmented learning (AL) is the use of real-life experiences, objects and elements that have been recreated on a computer or mobile device to enhance specific educational concepts.
  • augmented memory - Augmented memory is the practice of artificially increasing a person's ability to produce long term memories and retain information.
  • augmented reality - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • Augusta Ada King - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • AUI - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUI (attachment unit interface) - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUP - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticate - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authenticated e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • Authenticated TURN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authentication authorization accounting - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authentication authorization accounting - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • authentication factor - An authentication factor is a category of credential used for identity verification.
  • authentication server - An authentication server is an application that facilitates authentication of an entity that attempts to access a network.

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close