Browse Definitions :

Browse Definitions by Alphabet

AZU - WIR

  • Azure Container Instances - Azure Container Instances is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.
  • Azure Cost Management by Cloudyn - Azure Cost Management by Cloudyn is a software as a service (SaaS) cost management and monitoring tool for multi-cloud environments.
  • Azure Data Studio (formerly SQL Operations Studio) - Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.
  • Azure DevOps (formerly Visual Studio Team Services) - Visual Studio Team Services (VSTS) -- rebranded as Azure DevOps in 2018 -- is an Azure cloud-hosted extension of Microsoft's Team Foundation Server (TFS) -- now called Azure DvOps -- that assist development teams with special tools and services for software programmers, analysts and testers as well as IT project or team managers.
  • Azure HDInsight - Azure HDInsight is a cloud-based service from Microsoft for big data analytics that helps organizations process large amounts of streaming or historical data.
  • Azure Kubernetes Service (AKS) - Azure Kubernetes Service (AKS) is a managed container orchestration service, based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.
  • Azure Migrate - Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.
  • Azure Notification Hubs - Azure Notification Hubs are push notification engines designed to update users with alerts about new content for a given site, service or app.
  • Azure Quantum - Azure Quantum is a full-stack cloud service designed to allow users remote access to quantum computers.
  • Azure Reserved Virtual Machine Instances - Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.
  • Azure Service Fabric - Azure Service Fabric is a Platform as a Service (PaaS) offering designed to facilitate the development, deployment and management of highly-scalable and customizable applications for the Microsoft Azure cloud platform.
  • Azure SQL Data Warehouse - Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare) - The Patient Protection and Affordable Care Act (more commonly referred to as the Affordable Care Act, ACA or Obamacare) is a healthcare law passed by Congress in 2010 during the administration of President Barack Obama.
  • SAP Ariba - SAP Ariba is a software company that provides cloud-based procurement, spend management and supply chain services that enable suppliers and buyers to connect and do business globally.
  • voice authentication - Voice authentication is a biometric method of speaker recognition based on measuring the distinctions in individual voices to uniquely identify users.
  • wireless access point - A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN).
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close