Browse Definitions :

Browse Definitions by Alphabet

ACC - ACT

  • accelerometer - An accelerometer is a device that measures changes in gravitational acceleration in a device it may be installed in.
  • acceptable spam report rate - An acceptable spam report rate is a metric set for how many of a company's marketing or status emails are reported as spam, also known as "junk mail," or unsolicited bulk messages sent through email.
  • acceptable use policy - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • acceptance testing - An acceptance test confirms that an story is complete by matching a user action scenario with a desired outcome.
  • acceptance testing - An acceptance test confirms that an story is complete by matching a user action scenario with a desired outcome.
  • acceptance test–driven development (ATDD) - Acceptance test–driven development (ATDD) is a collaborative process where developers, testers and business representatives come together to work out requirements, perceive potential pitfalls and reduce the chance of errors before coding begins.
  • access - Access is simply being able to get to what you need.
  • access control - Access control is a security technique that regulates who or what can view or use resources in a computing environment.
  • Access Control Facility - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • access control list - An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
  • access control list (ACL) - An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
  • access governance (AG) - Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.
  • access layer - The access layer is where host computers and end users connect to the network.
  • access list (AL) - An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.
  • access log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • access method - In computing, an access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal.
  • access network - An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.
  • Access Network Query Protocol (ANQP) - The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot.
  • access point base station - Access point base station is the original term for what is now known as a femtocell.
  • access point mapping - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • access provider - An access provider is any organization that arranges for an individual or an organization to have access to the Internet.
  • access recertification - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.
  • access time - Access time is the time from the start of one storage device access to the time when the next access can be started.
  • accessability - Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities.
  • AccessChk - AccessChk is a free Sysinternals command-line utility that shows what access a user or group of users has to a particular service, file, folder or registry key.
  • AccessEnum - AccessEnum is a free Sysinternals tool that offers administrators a view of the full file system and registry security settings to ensure that users have appropriate permissions to access files and directories.
  • accessibility testing - Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system.
  • Accessible Transportation Technologies Research Initiative (ATTRI) - The Accessible Transportation Technologies Research Initiative (ATTRI) is a five-year, multi-agency research and development (R&D) program aimed at helping injured veterans, older adults and others in the United States with visual, hearing, cognitive and mobility challenges to plan and execute their travel using technology.
  • account - An account is a unique record for each type of asset, liability, equity, revenue and expense.
  • account-based experience (ABX) - Account-based experience (ABX) is a methodology in which separate teams in an organization work closely with one another to ensure all brand interactions are focused on the end user.
  • account-based marketing (ABM) - Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on targeted accounts within a specific market.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • accountable care organization (ACO) - An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.
  • accounting error - What is an accounting error?An accounting error is a non-fraudulent discrepancy in financial documentation.
  • accounts payable - Accounts payable is a liability account in the general ledger (GL).
  • accounts receivable (AR) - Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.
  • accumulator - An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a computer's CPU (central processing unit).
  • ACeS - Asia Cellular Satellite System(ACeS) is a combined cellular telephone and satellite wireless system from Ericsson that provides digital communication service to mobile phone and computer users in the Asia Pacific Region.
  • ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ACF2 or CA-ACF2 (Access Control Facility) - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ACH - Automated Clearing House (ACH) is a secure payment transfer system that connects all U.
  • Achievers Corp. - Achievers is a maker of talent management software and provider of consulting services headquartered in Toronto, Canada.
  • achromatic - Achromatic is an adjective that means free of color.
  • ACID - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ACID (atomicity, consistency, isolation, and durability) - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ACK - In some digital communication protocols, ACK is the name of a signal that data has been received successfully (for example, with an acceptable number of errors).
  • ACL - An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
  • ACM - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • ACM (Association for Computing Machinery) - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • acoustic coupler - An acoustic coupler is a hardware device that enables a modem (a device that converts signals from analog to digital and from digital back to analog) to connect to a voice circuit.
  • acoustic wave - A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water, or any other liquid or solid matter) as it propagates away from the source of the sound.
  • acoustical infection - Acoustic infection is a type of malware that uses a compromised computer’s sound card and speakers to send data using a covert ultrasonic acoustical mesh network.
  • acoustical mesh network - An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers.
  • ACPI - ACPI (Advanced Configuration and Power Interface) is an industry specification for the efficient handling of power consumption in desktop and mobile computers.
  • ACPI (Advanced Configuration and Power Interface) - ACPI (Advanced Configuration and Power Interface) is an industry specification for the efficient handling of power consumption in desktop and mobile computers.
  • acquihire - An acquihire is the purchase of one company by another for the sole purpose of retaining the business' staff.
  • acquisition plan - An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for the processes involved with acquiring goods, services or other organizations.
  • ACR - Attenuation-to-crosstalk ratio (ACR), also called headroom, is the difference, expressed as a figure in decibels (dB), between the signal attenuation produced by a wire or cable transmission medium and the near-end crosstalk (NEXT).
  • Acrobat - Acrobat is a program from Adobe that lets you capture a document and then view it in its original format and appearance.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • Acrylic - Expression Graphic Designer is Microsoft's new software tool for creating the images that appear in an application's user interface, or UI.
  • ACT - Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment.
  • ACTA - ACTA (America's Carriers Telecommunications Association) is a lobbying organization for over 165 small long-distance telephone carrier companies.
  • ACTA (America's Carriers Telecommunications Association) - ACTA (America's Carriers Telecommunications Association) is a lobbying organization for over 165 small long-distance telephone carrier companies.
  • Actifio - Actifio is a software vendor in Waltham, Mass.
  • action item - An action item is a discrete task that must be accomplished, usually by a single individual or a small team or group.
  • action plan - An action plan is a document that lists what steps must be taken in order to achieve a specific goal.
  • actionable - Actionable, in a business context, is an adjective referring to things that can be acted upon.
  • actionable intelligence - Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • ActionScript Cheat Sheets - We've gathered cheat sheets for fast reference to ActionScript-related information.
  • active archive - An active archive is a collection of data that is too valuable for a company to discard, but only needs to be accessed occasionally.
  • active attack - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.
  • active cooling - Active cooling is the use of fans to reduce the heat of computer components.
  • active defense - An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.
  • Active Directory - Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
  • Active Directory Certificate Services (AD CS) - Active Directory Certificate Services (AD CS) is an Active Directory tool that lets administrators customize services in order to issue and manage public key certificates.
  • Active Directory domain (AD domain) - An Active Directory domain is a collection of objects within a Microsoft Active Directory network.
  • Active Directory Federation Services (AD FS) - Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.
  • Active Directory forest (AD forest) - An Active Directory forest is the highest level of organization within Active Directory.
  • Active Directory functional levels - Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.
  • Active Directory tree (AD tree) - An Active Directory tree is a collection of domains within a Microsoft Active Directory network.
  • active man in the middle attack - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active man-in-the-middle attack - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active man-in-the-middle attack (MitM) - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active matrix display - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.
  • active matrix display (thin film transistor or TFT) - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.
  • active network - An active network is a network in which the nodes are programmed to perform custom operations on the messages that pass through the node.
  • active reconnaissance - Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • Active Server Page - ASP is also an abbreviation for application service provider.
  • Active Server Page (ASP) - ASP is also an abbreviation for application service provider.
  • Active Server Pages (ASP) Cheat Sheets - We've gathered cheat sheets for fast reference to Active Server Pages (ASP)-related information.
  • Active Template Library - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • Active Template Library (ATL) - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • active/active array - Active/active (also called dual active) is a storage array configuration in which two (or more) storage controllers work together to process inputs/outputs (I/Os).
  • ActiveX - ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close