Browse Definitions :

Browse Definitions by Alphabet

ACM - ADS

  • ACM - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • ACM (Association for Computing Machinery) - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • acoustic wave - A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water, or any other liquid or solid matter) as it propagates away from the source of the sound.
  • acoustical infection - Acoustic infection is a type of malware that uses a compromised computer’s sound card and speakers to send data using a covert ultrasonic acoustical mesh network.
  • acoustical mesh network - An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers.
  • acquihire - An acquihire is the purchase of one company by another for the sole purpose of retaining the business' staff.
  • acquisition plan - An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for the processes involved with acquiring goods, services or other organizations.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • acronyms used in online chatting - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • ACT - Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment.
  • Actifio - Actifio is a software vendor in Waltham, Mass.
  • action item - An action item is a discrete task that must be accomplished, usually by a single individual or a small team or group.
  • action plan - An action plan is a document that lists what steps must be taken in order to achieve a specific goal.
  • actionable - Actionable, in a business context, is an adjective referring to things that can be acted upon.
  • actionable insights - Actionable insights are conclusions drawn from data that can be turned directly into an action or a response.
  • actionable intelligence - Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • active archive - An active archive is a collection of data that is too valuable for a company to discard, but only needs to be accessed occasionally.
  • active attack - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.
  • active cooling - Active cooling is the use of fans to reduce the heat of computer components.
  • active defense - An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.
  • active directory - Active Directory (AD) is Microsoft's proprietary directory service.
  • Active Directory Certificate Services (AD CS) - Active Directory Certificate Services (AD CS) is an Active Directory tool that lets administrators customize services in order to issue and manage public key certificates.
  • Active Directory domain (AD domain) - An Active Directory domain is a collection of objects within a Microsoft Active Directory network.
  • Active Directory Federation Services (AD FS) - Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.
  • Active Directory forest (AD forest) - An Active Directory forest is the highest level of organization within Active Directory.
  • Active Directory functional levels - Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.
  • Active Directory tree (AD tree) - An Active Directory tree is a collection of domains within a Microsoft Active Directory network.
  • active learning (active learner algorithm) - Active learning, in an AI context, is the capacity of a machine learning algorithm to query sources for more data during its processes.
  • active man in the middle attack - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active man-in-the-middle attack - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active man-in-the-middle attack (MitM) - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active reconnaissance - Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • Active Template Library - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • Active Template Library (ATL) - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • ActiveX - ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.
  • ActiveX controls - ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.
  • ActiveX Data Objects - ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.
  • ActiveX Data Objects (ADO) - ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.
  • activity-based management (ABM) - Activity-based management is a management strategy in which business processes are evaluated and adjusted for their cost efficiency using activity-based costing.
  • actuator - An actuator is a mechanism that turns energy into a controlled motion.
  • Acxiom - Acxiom is an identity based marketing company and data broker that specializes in personalized marketing.
  • ad blocker - An ad blocker is a software product that prevents advertisements from appearing with the content the user is intentionally viewing.
  • ad exchange - An ad exchange is a software-based automated marketplace that allows publishers to sell their ad inventory and advertisers to bid on and purchase the inventory in real time.
  • ad fraud - Ad fraud is a type of scam in which the perpetrator fools advertisers into paying for something useless to them, such as fake traffic, fake leads or ineffective and misrepresented ad placement.
  • ad fraud botnet - An ad fraud botnet is a distributed network of computers controlled by a botmaster to defraud advertisers.
  • ad hoc - Ad hoc is an adjective used to describe things that are created on the spot, usually for a single use.
  • ad hoc analysis - Ad hoc analysis is a business intelligence (BI) process designed to answer specific business questions by using company data from various sources.
  • ad hoc test - An ad hoc test is an unplanned and undocumented procedure designed to assess the viability of a product.
  • ad hoc testing - Ad hoc testing is a non-methodical approach to assessing the viability of a product.
  • ad inventory (advertising inventory) - Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.
  • ad network - An ad network (advertising network) is an intermediary company that acts as a broker between advertisers who want to purchase inventory and publishers who want to host ads.
  • ad server - An ad server is software that stores advertising content and delivers it to websites and applications.
  • Ada Byron, countess of Lovelace - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • Ada Lovelace - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • Ada Lovelace (Augusta Ada King) - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • adapter - An adapter is a physical device that allows one hardware or electronic interface to be adapted (accommodated without loss of function) to another hardware or electronic interface.
  • adapter - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • adaptive cruise control - Adaptive cruise control (ACC) is a driver assistance technology that sets a maximum speed for vehicles and automatically slows the speed of the car when traffic is sensed in front of the vehicle.
  • adaptive differential pulse code modulation - ADPCM (adaptive differential pulse-code modulation) is a technique for converting sound or analog information to binary information (a string of 0's and 1's) by taking frequent samples of the sound and expressing the value of the sampled sound modulation in binary terms.
  • adaptive differential pulse-code modulation - ADPCM (adaptive differential pulse-code modulation) is a technique for converting sound or analog information to binary information (a string of 0's and 1's) by taking frequent samples of the sound and expressing the value of the sampled sound modulation in binary terms.
  • Adaptive Insights (formerly called Adaptive Planning) - Adaptive Insights (formerly called Adaptive Planning) is a cloud-based corporate performance management software (CPM) vendor headquartered in Mountain View, California.
  • adaptive routing (dynamic routing) - Adaptive routing, also called dynamic routing, is a process for determining the optimal path a data packet should follow through a network to arrive at a specific destination.
  • adaptive security - Adaptive security is an approach to safeguarding systems and data by recognizing threat-related behaviors rather than the files and code used by virus definitions.
  • Adaptive Server Enterprise - Adaptive Server Enterprise (ASE) is a relational database management system (RDBMS) from Sybase, Inc.
  • Adaptive Server Enterprise (ASE) - Adaptive Server Enterprise (ASE) is a relational database management system (RDBMS) from Sybase, Inc.
  • adaptive software - Assistive software, also called adaptive software, refers to computer programs designed for specialized hardware used by physically challenged people.
  • adaptive technology - Assistive technology is a set of devices intended to help people who have disabilities.
  • ADC - Analog-to-digital conversion is an electronic process in which a continuously variable (analog) signal is changed, without altering its essential content, into a multi-level (digital) signal.
  • add-in - Add-in is a term used, especially by Microsoft, for a software utility or other program that can be added to a primary program.
  • add-on - An add-on is either a hardware unit that can be added to a computer to increase its capabilities or a program utility that enhances a primary program.
  • address bar - The address bar is the familiar text field at the top of a web browser’s graphical user interface (GUI) that displays the name or the URL (uniform resource locator) of the current web page.
  • Address Resolution Protocol - Address Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet Protocol address (IP address) to a permanent physical machine address in a local area network (LAN).
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN).
  • address sign - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • address space - Address space is the amount of memory allocated for all possible addresses for a computational entity -- for example, a device, a file, a server or a networked computer.
  • address space layout randomization (ASLR) - Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.
  • addressability - Addressability is the capacity for an entity to be targeted and found.
  • addressable call endpoint - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • adhocracy - Adhocracy is a business management and corporate culture model based the ability to adapt quickly to changing conditions.
  • adiabatic cooling - Adiabatic cooling is the process of reducing heat through a change in air pressure caused by volume expansion.
  • adjective - An adjective is a word or phrase that describes or modifies a noun.
  • administrator code - In government contracting, an administrator code (AC), like a buyer code (BC), is a code assigned to each Post Award Administrator.
  • admittance - Admittance (symbolized Y) is an expression of the ease with which alternating current (AC) flows through a complex circuit or system.
  • admittance (Y) - Admittance (symbolized Y) is an expression of the ease with which alternating current (AC) flows through a complex circuit or system.
  • ADO - ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.
  • Adobe Experience Platform - Adobe Experience Platform, formerly known as Adobe Cloud Platform, is a suite of customer experience management (CEM) services and tools.
  • Adobe Flash Player - Adobe Flash Player is software used to stream and view video, audio and multimedia and Rich Internet Applications (RIA) on a computer or supported mobile device.
  • Adobe Sign - Adobe Sign is a cloud-based service that lets an individual or organization send, secure, track and manage e-signature processes.
  • ADP Mobile Solutions - ADP Mobile Solutions allows employees to use their mobile devices to access records such as their pay, schedules, time cards, retirement funds, benefits, contacts and calendar.
  • ADPCM - ADPCM (adaptive differential pulse-code modulation) is a technique for converting sound or analog information to binary information (a string of 0's and 1's) by taking frequent samples of the sound and expressing the value of the sampled sound modulation in binary terms.
  • ADPCM (adaptive differential pulse-code modulation) - ADPCM (adaptive differential pulse-code modulation) is a technique for converting sound or analog information to binary information (a string of 0's and 1's) by taking frequent samples of the sound and expressing the value of the sampled sound modulation in binary terms.
  • ADS - An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title.
  • ADSI - ADSI (Analog Display Services Interface) is the standard protocol for enabling alternate voice and data services, such as a visual display at the phone, over the analog telephone network.
  • ADSI (Analog Display Services Interface) - ADSI (Analog Display Services Interface) is the standard protocol for enabling alternate voice and data services, such as a visual display at the phone, over the analog telephone network.
  • ADSL - ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.
  • ADSL (Asymmetric Digital Subscriber Line) - ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close