Browse Definitions :

Browse Definitions by Alphabet

AWS - WIR

  • AWS Multi-Factor Authentication (AWS MFA) - AWS Multi-Factor Authentication (MFA) is the practice or requiring two or more forms of authentication to protect AWS resources.
  • AWS Network Load Balancer (NLB) - Network Load Balancer is an Amazon Web Services (AWS) tool that distributes end user traffic across multiple cloud resources to ensure low latency and high throughput for applications.
  • AWS On-Demand Instances (Amazon Web Services On-Demand Instances) - AWS On-Demand Instances (Amazon Web Services On-Demand Instances) are virtual servers that run in AWS Elastic Compute Cloud (EC2) or AWS Relational Database Service (RDS) and are purchased at a fixed rate per hour.
  • AWS OpsWorks (Amazon Web Services OpsWorks) - AWS OpsWorks is a cloud computing service from Amazon Web Services (AWS) that manages infrastructure deployment for cloud administrators.
  • AWS Organizations - AWS Organizations is a cloud service that applies and manages access policies across Amazon Web Services accounts.
  • AWS Outposts - AWS Outposts is an on-premises IT as a service (ITaaS) platform provided by Amazon Web Services (AWS).
  • AWS Partner Network (APN) - The AWS Partner Network (APN) is a tiered group of cloud software and service vendors that earn endorsement from Amazon Web Services after meeting several criteria.
  • AWS PrivateLink - AWS PrivateLink is a networking feature provided by Amazon Web Services (AWS) that eases and secures connectivity between Amazon Virtual Private Clouds (VPCs), other Amazon cloud services and on-premises applications.
  • AWS Reserved Instance Marketplace (Amazon Web Services Reserved Instance Marketplace) - The AWS Reserved Instance Marketplace (Amazon Web Services Reserved Instance Marketplace) is an online store in which businesses can buy or sell new or partially used Amazon Elastic Compute Cloud (Amazon EC2) Reserved Instances.
  • AWS Reserved Instances (Amazon Reserved Instances) - AWS Reserved Instances are virtual servers spun up in Amazon Web Services, allowing cloud administrators to purchase computing power at contract pricing.
  • AWS SDK for .NET - The AWS SDK for .
  • AWS SDK for Android - The AWS SDK for Android is a collection of tools for developers creating applications for the Android operating system.
  • AWS SDK for Go - The AWS SDK for Go is a collection of tools that helps a developer integrate applications built with the Go programming language into the Amazon Web Services (AWS) public cloud.
  • AWS SDK for iOS - The AWS SDK for iOS is a collection of software tools for the development of applications for Apple iOS-based devices like the iPhone, iPad and iPod.
  • AWS SDK for Java - The AWS SDK for Java is a collection of tools for developers creating Java-based Web apps to run on Amazon cloud components such as Amazon Simple Storage Service (S3), Amazon Elastic Compute Cloud (EC2) and Amazon SimpleDB.
  • AWS SDK for JavaScript - The AWS SDK for JavaScript is a collection of software tools for the creation of applications and libraries that use Amazon Web Services (AWS) resources.
  • AWS SDK for PHP - The AWS SDK for PHP is an open source library designed to help developers build applications that are based on the PHP server-side scripting language within Amazon Web Services (AWS).
  • AWS SDK for Ruby - The AWS SDK for Ruby is a collection of tools designed to help a developer build applications within Amazon Web Services (AWS) that are based on the Ruby open source object-oriented programming language.
  • AWS Secrets Manager - AWS Secrets Manager is a security service to centrally manage sensitive information and eliminate the need to hard-code that information into an application.
  • AWS Security Token Service - The AWS Security Token Service is an Amazon Web Services (AWS) software tool that enables an IT administrator to grant trusted users temporary and limited access credentials to public cloud resources.
  • AWS Serverless Application Model (AWS SAM) - AWS Serverless Application Model (AWS SAM) is a framework a developer can use to create and deploy serverless applications that run on Amazon's cloud.
  • AWS Service Catalog (Amazon Web Services Service Catalog) - The AWS Service Catalog (Amazon Web Services Service Catalog) is a product that allows cloud administrators to provision applications for end users by setting configurations within product portfolios.
  • AWS Shield - AWS Shield is a security service that protects web applications hosted on the Amazon Web Services public cloud against distributed denial of service (DDoS) attacks.
  • AWS Single Sign-On (AWS SSO) - AWS Single Sign-On (AWS SSO) is a service from Amazon Web Services that enables IT to manage user access to multiple applications and AWS accounts from a single, centralized console.
  • AWS Snowball Edge - AWS Snowball Edge is a physical appliance intended to help an enterprise migrate large volumes of data into and off of the AWS public cloud.
  • AWS Snowmobile - AWS Snowmobile is an Amazon Web Services (AWS) cloud storage service designed to transfer huge amounts of data by truck.
  • AWS Spot Fleets (Amazon Web Services Spot Fleets) - An AWS Spot Fleet (Amazon Web Services Spot Fleets) is a collection of virtual servers (instances) purchased at reduced rates within Amazon Elastic Compute Cloud (EC2).
  • AWS Spot Instance - AWS Spot Instance is a purchasing option that allows a customer to purchase unused Amazon EC2 computer capacity at a highly-reduced rate.
  • AWS Step Functions - AWS Step Functions is a cloud service from Amazon Web Services that enables a developer to manage and visualize the components of distributed, multi-component applications.
  • AWS Storage Gateway (Amazon Web Services Storage Gateway) - AWS Storage Gateway securely transfers application data between on-premises software and cloud-based storage to improve application scalability and help an enterprise save costs.
  • AWS Support (Amazon Web Services Support) - AWS Support provides advice and tools for developers in the AWS cloud.
  • AWS Test Drive - The AWS Test Drive is a free Amazon Web Services tool that allows consulting and technology partners to test third-party software environments.
  • AWS Trusted Advisor (Amazon Web Services Trusted Advisor) - AWS Trusted Advisor is a product that allows a cloud administrator to provision Amazon Web Services resources according to best practices in four categories: cost optimization, security, fault tolerance and performance improvement.
  • AWS Web Application Firewall (AWS WAF) - AWS Web Application Firewall (WAF) is a security system that controls incoming and outgoing traffic for applications and websites based in the Amazon Web Services public cloud.
  • AWS X-Ray - AWS X-Ray is an application performance management service that enables a developer to analyze and debug applications in the Amazon Web Services (AWS) public cloud.
  • AWT - Abstract Window Toolkit (AWT) is a set of application program interfaces (APIs) used by Java programmers to create graphical user interface (GUI) objects, such as buttons, scroll bars, and windows.
  • AXT - Alien crosstalk (AXT) is electromagnetic noise that can occur in a cable that runs alongside one or more other signal-carrying cables.
  • azimuth and elevation - Azimuth and elevation are angles used to define the apparent position of an object in the sky, relative to a specific observation point.
  • Azure Bot Service - Azure Bot Service is Microsoft’s artificial intelligence (AI) chatbot offered as a service on the Azure cloud service marketplace.
  • Azure Container Instances - Azure Container Instances is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.
  • Azure Cost Management by Cloudyn - Azure Cost Management by Cloudyn is a software as a service (SaaS) cost management and monitoring tool for multi-cloud environments.
  • Azure Data Studio (formerly SQL Operations Studio) - Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.
  • Azure HDInsight - Azure HDInsight is a cloud-based service from Microsoft for big data analytics that helps organizations process large amounts of streaming or historical data.
  • Azure Kubernetes Service (AKS) - Azure Kubernetes Service (AKS) is a managed container orchestration service, based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.
  • Azure Migrate - Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.
  • Azure Notification Hubs - Azure Notification Hubs are push notification engines designed to update users with alerts about new content for a given site, service or app.
  • Azure Quantum - Azure Quantum is a full-stack cloud service designed to allow users remote access to quantum computers.
  • Azure Reserved Virtual Machine Instances - Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.
  • Azure Service Fabric - Azure Service Fabric is a Platform as a Service (PaaS) offering designed to facilitate the development, deployment and management of highly-scalable and customizable applications for the Microsoft Azure cloud platform.
  • Azure SQL Data Warehouse - Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare) - The Patient Protection and Affordable Care Act (more commonly referred to as the Affordable Care Act, ACA or Obamacare) is a healthcare law passed by Congress in 2010 during the administration of President Barack Obama.
  • SAP Ariba - SAP Ariba is a software company that provides cloud-based procurement, spend management and supply chain services that enable suppliers and buyers to connect and do business globally.
  • voice authentication - Voice authentication is a biometric method of speaker recognition based on measuring the distinctions in individual voices to uniquely identify users.
  • wireless access point - A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN).

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close