Browse Definitions :

Browse Definitions by Alphabet

AUD - AUT

  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • audit trail - In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries.
  • auditor - In Web advertising, this usually means a third-party company that audits the number of visitors to or impression sent from a Web site during some time period.
  • AUFS (Advanced Multi-Layered Unification Filesystem) - Advanced multi-layered unification filesystem (AUFS) is a union filesystem sometimes used in platform-as-a-service environments to merge distinct directory hierarchies into a single directory.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.
  • augmented memory - Augmented memory is the practice of artificially increasing a person's ability to produce long term memories and retain information.
  • augmented reality - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • Augusta Ada King - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • AUI - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUI (attachment unit interface) - The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable.
  • AUP - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
  • Austrumi - Skinny Linux is an umbrella term that encompasses any compact version of the Linux operating system, such as Austrumi, Puppy Linux Damn Small Linux and Feather Linux.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticate - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authenticated e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • Authenticated TURN - On-Demand Mail Relay (ODMR), also known as Authenticated TURN (ATRN), is an e-mail service that allows a user to connect to an Internet service provider (ISP), authenticate, and request e-mail using a dynamic IP address from any Internet connection.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
  • authentication authorization accounting - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authentication authorization accounting - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • authentication factor - An authentication factor is a category of credential used for identity verification.
  • authentication server - An authentication server is an application that facilitates authentication of an entity that attempts to access a network.
  • authentication ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication ticket or ticket-granting ticket (TGT) - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
  • authorization - Authorization is the process of giving someone permission to do or have something.
  • authorized program analysis report - An APAR (authorized program analysis report) is a term used in IBM for a description of a problem with an IBM program that is formally tracked until a solution is provided.
  • authorized program analysis report (APAR) - An APAR (authorized program analysis report) is a term used in IBM for a description of a problem with an IBM program that is formally tracked until a solution is provided.
  • authorized service provider (ASP) - An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.
  • auto 3 D - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • auto 3-D - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • auto 3-D (autostereoscopic imaging) - Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • auto-correct fail (auto-correct error) - An auto-correct fail is an error created when the software created to detect and correct misspelled words replaces a user-generated mistake with a different, and possibly worse, error.
  • auto-provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • auto-storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • autoblog - An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds.
  • autoclassification - Autoclassification is an intelligent technology found in some content management systems (CMS) wherein documents are scanned and automatically assigned categories and keywords based on the content within the documents.
  • Autodesk Constructware - Constructware is Autodesk's Web-based project management tool that connects different business operations and information in order to standardize business processes.
  • autodialer - An autodialer is a software program that automatically dials telephone numbers from a list or a database.
  • autoexec.bat - AUTOEXEC.BAT is a file containing Disk Operating System commands that are executable when the computer is booted (started).
  • autofax - Autofax is the automatic (computer-initiated) sending of a facsimile (fax) message over a network in one of two ways: ( to a receiving computer or fax machine that is always ready to receive and store or immediately print such transmissions or (2), in some cases, as an e-mail note.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • autoloader - A stackloader (also known as an autoloader) is a tape storage device that automatically loads tape cartridges using a robotic mechanism.
  • autoloader (or stackloader) - A stackloader (also known as an autoloader) is a tape storage device that automatically loads tape cartridges using a robotic mechanism.
  • automagically - Automagically is a term used when the user either doesn't want to go into the technical details of something or doesn't know the details but does know what the end result has to be.
  • Automated Best Value System - Automated Best Value System is a calculated formula that assesses past performance based on quality, delivery and packaging performance.
  • Automated Best Value System (ABVS) - Automated Best Value System is a calculated formula that assesses past performance based on quality, delivery and packaging performance.
  • Automated Clearing House - Automated Clearing House (ACH) is a secure payment transfer system that connects all U.
  • Automated Clearing House (ACH) - Automated Clearing House (ACH) is a secure payment transfer system that connects all U.
  • Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the Automated Clearing House financial transaction network.
  • automated data tiering - Automated data tiering is a type of software program that moves data files, volumes or blocks between tiered storage according to company-defined policy.
  • Automated Fingerprint Identification System - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • Automated Fingerprint Identification System (AFIS) - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • Automated Insights - Automated Insights is a company that makes artificial intelligence (AI) applications that can understand statistical, numeric and graphed data and present it in an articulate and understandable written format.
  • Automated License Plate Recognition - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • automated meter reading - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated meter reading (AMR) - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated provisioning - Automated provisioning is the ability to deploy an information technology or telecommunications service by using predefined procedures that are carried out electronically without requiring human intervention.
  • automated reasoning - Automated reasoning is the area of computer science that is concerned with applying reasoning in the form of logic to computing systems.
  • automated speech recognition - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated speech recognition (ASR) - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated storage tiering - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storage tiering (AST) - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storytelling - Automated storytelling is a process involving the use of artificial intelligence (AI) to create written stories.
  • automated tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • automated test equipment - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated test equipment (ATE) - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • automatic backup - Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction.
  • Automatic Call Distributor (ACD) - An Automatic Call Distributor (ACD) is a telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions.
  • automatic callback - Automatic callback is a telephone system feature that permits a caller who gets a busy signal to instruct the system to establish the connection when the line becomes available.
  • Automatic Coin Telephone System - ACTS (Automatic Coin Telephone System) is a public coin-operated telephone service that completes a variety of phone calls, times the calls, and collects payment without the aid of an operator.
  • Automatic Coin Telephone System - Automatic Coin Telephone System (ACTS) is a public coin-operated telephone service that completes a variety of phone calls, times the calls, and collects payment without the aid of an operator.
  • Automatic Coin Telephone System (ACTS) - Automatic Coin Telephone System (ACTS) is a public coin-operated telephone service that completes a variety of phone calls, times the calls, and collects payment without the aid of an operator.
  • automatic content classification - Automatic content classification is a process for managing text and unstructured information by categorizing or clustering text.
  • Automatic Data Processing Inc. (ADP) - Automatic Data Processing Inc.
  • automatic document feed - In printer specifications, ADF stands for automatic document feed.
  • Automatic Identification and Data Capture - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • automatic language translation - Automatic language translation is the use of a computer program to translate input text from one national language to another while maintaining the original document format.
  • Automatic Private IP Addressing - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • automatic repeat request - Automatic repeat request (ARQ) is a protocol for error control in data transmission.
  • automatic repeat request (ARQ) - Automatic repeat request (ARQ) is a protocol for error control in data transmission.
  • automatic storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
  • automatic vehicle locator - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automotive IT - Automotive IT is any hardware or software designed to augment and support the experience of operating a motor vehicle.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close