Browse Definitions :

Browse Definitions by Alphabet

ACC - AD

  • access control list (ACL) - An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
  • access governance (AG) - Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.
  • access layer - The access layer is where host computers and end users connect to the network.
  • access list (AL) - An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.
  • access log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • access network - An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.
  • Access Network Query Protocol (ANQP) - The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot.
  • access point mapping - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • access provider - An access provider is any organization that arranges for an individual or an organization to have access to the Internet.
  • access recertification - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.
  • access time - Access time is the time from the start of one storage device access to the time when the next access can be started.
  • accessability - Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities.
  • AccessChk - AccessChk is a free Sysinternals command-line utility that shows what access a user or group of users has to a particular service, file, folder or registry key.
  • AccessEnum - AccessEnum is a free Sysinternals tool that offers administrators a view of the full file system and registry security settings to ensure that users have appropriate permissions to access files and directories.
  • accessibility testing - Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system.
  • Accessible Transportation Technologies Research Initiative (ATTRI) - The Accessible Transportation Technologies Research Initiative (ATTRI) is a five-year, multi-agency research and development (R&D) program aimed at helping injured veterans, older adults and others in the United States with visual, hearing, cognitive and mobility challenges to plan and execute their travel using technology.
  • account - An account is a unique record for each type of asset, liability, equity, revenue and expense.
  • account-based experience (ABX) - Account-based experience (ABX) is a methodology in which separate teams in an organization work closely with one another to ensure all brand interactions are focused on the end user.
  • account-based marketing (ABM) - Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on targeted accounts within a specific market.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • accountable care organization (ACO) - An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.
  • accounting error - What is an accounting error?An accounting error is a non-fraudulent discrepancy in financial documentation.
  • accounts payable - Accounts payable is a liability account in the general ledger (GL).
  • accounts receivable (AR) - Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.
  • accumulator - An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a computer's CPU (central processing unit).
  • ACD - An Automatic Call Distributor (ACD) is a telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions.
  • ACeS - Asia Cellular Satellite System(ACeS) is a combined cellular telephone and satellite wireless system from Ericsson that provides digital communication service to mobile phone and computer users in the Asia Pacific Region.
  • ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ACF2 or CA-ACF2 (Access Control Facility) - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ACH - Automated Clearing House (ACH) is a secure payment transfer system that connects all U.
  • Achievers Corp. - Achievers is a maker of talent management software and provider of consulting services headquartered in Toronto, Canada.
  • achromatic - Achromatic is an adjective that means free of color.
  • ACID - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ACID (atomicity, consistency, isolation, and durability) - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ACK - In some digital communication protocols, ACK is the name of a signal that data has been received successfully (for example, with an acceptable number of errors).
  • ACL - An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
  • ACM - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • ACM (Association for Computing Machinery) - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • acoustic wave - A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water, or any other liquid or solid matter) as it propagates away from the source of the sound.
  • acoustical infection - Acoustic infection is a type of malware that uses a compromised computer’s sound card and speakers to send data using a covert ultrasonic acoustical mesh network.
  • acoustical mesh network - An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers.
  • ACPI - ACPI (Advanced Configuration and Power Interface) is an industry specification for the efficient handling of power consumption in desktop and mobile computers.
  • acquihire - An acquihire is the purchase of one company by another for the sole purpose of retaining the business' staff.
  • acquisition plan - An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for the processes involved with acquiring goods, services or other organizations.
  • ACR - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • acronyms used in online chatting - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • Acrylic - Expression Graphic Designer is Microsoft's new software tool for creating the images that appear in an application's user interface, or UI.
  • ACT - Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment.
  • ACTA - ACTA (America's Carriers Telecommunications Association) is a lobbying organization for over 165 small long-distance telephone carrier companies.
  • Actifio - Actifio is a software vendor in Waltham, Mass.
  • action item - An action item is a discrete task that must be accomplished, usually by a single individual or a small team or group.
  • action plan - An action plan is a document that lists what steps must be taken in order to achieve a specific goal.
  • actionable - Actionable, in a business context, is an adjective referring to things that can be acted upon.
  • actionable insights - Actionable insights are conclusions drawn from data that can be turned directly into an action or a response.
  • actionable intelligence - Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • ActionScript Cheat Sheets - We've gathered cheat sheets for fast reference to ActionScript-related information.
  • active archive - An active archive is a collection of data that is too valuable for a company to discard, but only needs to be accessed occasionally.
  • active attack - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.
  • active cooling - Active cooling is the use of fans to reduce the heat of computer components.
  • active defense - An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.
  • active directory - Active Directory (AD) is Microsoft's proprietary directory service.
  • Active Directory Certificate Services (AD CS) - Active Directory Certificate Services (AD CS) is an Active Directory tool that lets administrators customize services in order to issue and manage public key certificates.
  • Active Directory domain (AD domain) - An Active Directory domain is a collection of objects within a Microsoft Active Directory network.
  • Active Directory Federation Services (AD FS) - Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.
  • Active Directory forest (AD forest) - An Active Directory forest is the highest level of organization within Active Directory.
  • Active Directory functional levels - Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.
  • Active Directory tree (AD tree) - An Active Directory tree is a collection of domains within a Microsoft Active Directory network.
  • active learning (active learner algorithm) - Active learning, in an AI context, is the capacity of a machine learning algorithm to query sources for more data during its processes.
  • active man in the middle attack - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active man-in-the-middle attack - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active man-in-the-middle attack (MitM) - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active matrix display - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.
  • active reconnaissance - Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • Active Server Page - ASP is also an abbreviation for application service provider.
  • Active Server Pages (ASP) Cheat Sheets - We've gathered cheat sheets for fast reference to Active Server Pages (ASP)-related information.
  • Active Template Library - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • Active Template Library (ATL) - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • active/active array - Active/active (also called dual active) is a storage array configuration in which two (or more) storage controllers work together to process inputs/outputs (I/Os).
  • ActiveX - ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.
  • ActiveX control - An ActiveX control is a component program object that can be re-used by many application programs within a computer or among computers in a network.
  • ActiveX Data Objects - ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.
  • ActiveX Data Objects (ADO) - ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.
  • activity-based management (ABM) - Activity-based management is a management strategy in which business processes are evaluated and adjusted for their cost efficiency using activity-based costing.
  • ACTS - ACTS (Automatic Coin Telephone System) is a public coin-operated telephone service that completes a variety of phone calls, times the calls, and collects payment without the aid of an operator.
  • actuator - An actuator is a mechanism that turns energy into a controlled motion.
  • Acxiom - Acxiom is an identity based marketing company and data broker that specializes in personalized marketing.
  • ad blocker - An ad blocker is a software product that prevents advertisements from appearing with the content the user is intentionally viewing.
  • ad exchange - An ad exchange is a software-based automated marketplace that allows publishers to sell their ad inventory and advertisers to bid on and purchase the inventory in real time.
  • ad fraud - Ad fraud is a type of scam in which the perpetrator fools advertisers into paying for something useless to them, such as fake traffic, fake leads or ineffective and misrepresented ad placement.
  • ad fraud botnet - An ad fraud botnet is a distributed network of computers controlled by a botmaster to defraud advertisers.
  • ad hoc - Ad hoc is an adjective used to describe things that are created on the spot, usually for a single use.
  • ad hoc analysis - Ad hoc analysis is a business intelligence (BI) process designed to answer specific business questions by using company data from various sources.
  • ad hoc test - An ad hoc test is an unplanned and undocumented procedure designed to assess the viability of a product.
  • ad hoc testing - Ad hoc testing is a non-methodical approach to assessing the viability of a product.
  • ad inventory (advertising inventory) - Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close