Browse Definitions :

Browse Definitions by Alphabet

ADU - ALE

  • adulting - Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.
  • advanced analytics - Advanced analytics is a broad category of inquiry that can be used to help drive changes and improvements in business practices.
  • Advanced Business Application Programming - ABAP (Advanced Business Application Programming) is the primary programming language supported on the SAP NetWeaver ABAP application server platform and applications that run on it, such as SAP ERP (formerly R/3), S/4HANA and CRM.
  • Advanced Encryption Standard - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • Advanced Encryption Standard (AES) - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • advanced evasion technique - An advanced evasion technique (AET) is a type of network attack that combines several different known evasion techniques on-the-fly to create a new technique that won't be recognized by an intrusion detection system.
  • advanced evasion technique (AET) - An advanced evasion technique (AET) is a type of network attack that combines several different known evasion techniques on-the-fly to create a new technique that won't be recognized by an intrusion detection system.
  • Advanced Interactive eXecutive - AIX is an open operating system from IBM that is based on a version of UNIX.
  • Advanced Message Queuing Protocol (AMQP) - Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.
  • advanced metering infrastructure - Advanced metering infrastructure (AMI) is an architecture for automated, two-way communication between a smart utility meter with an IPaddress and a utility company.
  • advanced metering infrastructure (AMI) - Advanced metering infrastructure (AMI) is an architecture for automated, two-way communication between a smart utility meter with an IPaddress and a utility company.
  • Advanced Micro Devices - AMD is the second largest maker of personal computer microprocessors after Intel.
  • Advanced Mobile Phone Service - Advanced Mobile Phone Service (AMPS) is a standard system for analog signal cellular telephone service in the United States and is also used in other countries.
  • Advanced Mobile Phone Service (AMPS) - Advanced Mobile Phone Service (AMPS) is a standard system for analog signal cellular telephone service in the United States and is also used in other countries.
  • Advanced Peer to Peer Networking - Advanced Peer-to-Peer Networking (APPN), part of IBM's Systems Network Architecture (SNA), is a group of protocols for setting up or configuring program-to-program communication within an IBM SNA network.
  • Advanced Peer-to-Peer Networking - Advanced Peer-to-Peer Networking (APPN), part of IBM's Systems Network Architecture (SNA), is a group of protocols for setting up or configuring program-to-program communication within an IBM SNA network.
  • Advanced Peer-to-Peer Networking (APPN) - Advanced Peer-to-Peer Networking (APPN), part of IBM's Systems Network Architecture (SNA), is a group of protocols for setting up or configuring program-to-program communication within an IBM SNA network.
  • advanced persistent threat - An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period of time.
  • advanced persistent threat (APT) - An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period of time.
  • advanced planning and scheduling - Advanced planning and scheduling (APS) is a type of system that tracks costs based on the activities that are responsible for driving costs in the production of manufactured goods.
  • advanced planning and scheduling (APS) - Advanced planning and scheduling (APS) is a type of system that tracks costs based on the activities that are responsible for driving costs in the production of manufactured goods.
  • Advanced Research Projects Agency Network - ARPANET was the network that became the basis for the Internet.
  • advanced shipping notice - Advanced shipping notice (ASN) is a document that provides detailed information about a pending delivery.
  • advanced shipping notice (ASN) - Advanced shipping notice (ASN) is a document that provides detailed information about a pending delivery.
  • Advanced Television - ATV (Advanced Television) is the name given by the U.
  • Advanced Television Enhancement Forum - The Advanced Television Enhancement Forum (ATVEF) is an alliance of leaders in the broadcast and cable industry, the consumer electronics industry, and the computer industry that developed the ATVEF enhanced content specification.
  • Advanced Television Enhancement Forum (ATVEF) - The Advanced Television Enhancement Forum (ATVEF) is an alliance of leaders in the broadcast and cable industry, the consumer electronics industry, and the computer industry that developed the ATVEF enhanced content specification.
  • Advanced Television Systems Committee - The Advanced Television Systems Committee (ATSC) is a standards organization that was created in 1982 as part of the Advanced Television Committee (ATV) to promote the establishment of technical standards for all aspects of advanced television systems.
  • Advanced Television Systems Committee (ATSC) - The Advanced Television Systems Committee (ATSC) is a standards organization that was created in 1982 as part of the Advanced Television Committee (ATV) to promote the establishment of technical standards for all aspects of advanced television systems.
  • AdventureWorks Database - AdventureWorks Database is a sample OLTP database that Microsoft ships with all of its SQL Server database products.
  • adverb - An adverb is a word that provides more information about a verb.
  • adversarial machine learning - Adversarial machine learning is a technique used in machine learning to fool or misguide a model with malicious input.
  • Advertising terminology on the internet - Cheat sheet quick look-up for advertising terminology on the Internet.
  • advertorial - An advertorial is a digital or print article that appears neutral but is sponsored content to promote a product or service.
  • adware - Adware is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  • AEBU - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • aerogel - Aerogel is a translucent, synthetic solid-state substance with extremely low density and excellent thermal insulating properties.
  • AES - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • AES - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • AET - An advanced evasion technique (AET) is a type of network attack that combines several different known evasion techniques on-the-fly to create a new technique that won't be recognized by an intrusion detection system.
  • AF - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • AF (audio frequency or a.f.) - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • affiliate (associate) - An affiliate or associate business is a company with a parent corporation that owns less than a controlling percentage of the company's voting stock.
  • affiliate marketing - Affiliate marketing is a performance-based marketing strategy in which one company pays another for referred business.
  • affinity marketing - Affinity marketing is a type of direct marketing in which a business forms a partnership with an organization to provide goods or services in exchange for access to a new market.
  • affinity rules - Affinity rules are settings that establish a relationship between two or more VMware virtual machines (VMs) and hosts.
  • AFIS - The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.
  • AFM - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • agbot (agricultural robot) - An agbot, also called an agribot, is an autonomous robot used in farming to help improve efficiency and reduce reliance on manual labor.
  • age of the customer - Age of the customer is the concept that consumers are more empowered than ever because they can access information about products and services over the Internet in real time.
  • Agency for Healthcare Research and Quality - The Agency for Healthcare Research and Quality (AHRQ) is a U.
  • Agency for Healthcare Research and Quality (AHRQ) - The Agency for Healthcare Research and Quality (AHRQ) is a U.
  • agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
  • agentless - Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.
  • Agile business intelligence (BI) - Agile business intelligence (BI) is a fast and flexible process that uses agile software development (ASD) methodologies to enable rapid development and allow users to efficiently adapt intelligence-based strategy to business needs.
  • Agile Manifesto - The Agile Manifesto is a document that identifies four key values and 12 principles that its authors believe software developers should use to guide their work.
  • agile marketing - Agile marketing is an iterative approach to marketing strategies that models methodologies used in agile software development.
  • Agile Project Management (APM) - Agile Project Management (APM) is an iterative approach to planning and guiding project processes that breaks them down into smaller cycles called sprints, or iterations.
  • Agile retrospective - An Agile retrospective is a meeting that's held at the end of an iteration in Agile software development.
  • Agile Software Development - Agile software development -- also referred to simply as Agile -- is a type of development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • agile software development - Agile software development -- also referred to simply as Agile -- is a type of development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • agile test automation pyramid - The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.
  • Agile velocity - Agile velocity is a metric that predicts how much work a software development team can successfully complete within a two-week sprint (or similar time-boxed period).
  • agnostic - Agnostic, in an information technology (IT) context, refers to something that is generalized so that it is interoperable among various systems.
  • agreed-upon procedures (AUP) - Agreed-upon procedures are the standards a company or client outlines when it hires an external party to perform an audit on specific tests or business process and then report on the results.
  • agri-tech - Agri-tech is the use of technology for farming that is developed to improve efficiency and profitability.
  • agribusiness - An agribusiness is a line of business (LOB) that focuses on the processing, warehousing, distribution, marketing and retailing of products used in farming.
  • Ah - An ampere hour (abbreviated Ah, or sometimes amp hour) is the amount of energy charge in a battery that will allow one ampere of current to flow for one hour.
  • AHCI (Advanced Host Controller Interface) - Advanced Host Controller Interface, or AHCI, is a technical standard for an interface that enables software to communicate with Serial ATA (SATA) devices.
  • AHIMA - The American Health Information Management Association (AHIMA) is a professional organization that promotes the business and clinical uses of electronic and paper-based medical information.
  • AHRQ - The Agency for Healthcare Research and Quality (AHRQ) is a U.
  • AI - Appreciative Inquiry (AI) is a change management approach that focuses on identifying what is working well, analyzing why it is working well and then doing more of it.
  • AI - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • AI accelerator - An AI accelerator is a microchip designed specifically to enable faster processing of artificial intelligence (AI) tasks.
  • AI democratization - AI democratization is the spread of artificial intelligence development to a wider user base that includes those without specialized knowledge of AI.
  • AI ethics (AI code of ethics) - AI ethics is a system of moral principles and techniques intended to inform the development and responsible use of artificial intelligence technology.
  • AI for Good - AI for Good is a public charity and UN platform that hosts annual summits in Geneva, Switzerland to discuss the beneficial use of artificial intelligence (AI).
  • AI governance - AI governance is the idea that there should be a legal framework for ensuring that machine learning (ML) technologies are well researched and developed with the goal of helping humanity navigate the adoption of AI systems fairly.
  • AI hearing aid - An AI hearing aid is a wearable device that can incorporate capabilities such as fitness tracking, audio streaming and translation in addition to the conventional function of enhancing sound for the user.
  • AI washing - AI washing is a marketing effort designed to associate brands and products with artificial intelligence, even though the connection may be tenuous or non-existent.
  • AI winter - AI winter is a quiet period for artificial intelligence research and development.
  • AICPA (American Institute of Certified Public Accountants) - The AICPA (American Institute of Certified Public Accountants) is a member association for the accounting profession that sets ethical standards for accountants, as well as U.
  • AIDA marketing model - The AIDA marketing model is a marketing, advertising and sales approach methodology designed to provide insight into the customer's mind and represent the steps needed to cultivate leads and generate sales.
  • AIDC - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • AIM - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • AIOps (artificial intelligence for IT operations) - AIOps is an umbrella term for the use of big data analytics, machine learning and other AI technologies to automate the identification and resolution of common IT issues.
  • air conditioning - HVAC stands for heating, ventilation, and air conditioning.
  • air gapping (air gap attack) - Air gapping is a security measure that involves physically isolating a computer or network and preventing it from establishing an external connection.
  • AirChat - AirChat is an anonymous wireless communications and connectivity tool that works without any wireless infrastructure.
  • airplane mode - Airplane mode is a setting on cell phones, smartphones and other mobile communication devices that prevents the device from sending or receiving calls and text messages.
  • AIX - AIX is an open operating system from IBM that is based on a version of UNIX.
  • AIX (Advanced Interactive eXecutive) - AIX is an open operating system from IBM that is based on a version of UNIX.
  • Ajax - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • Ajax quiz: Do you speak Geek? - A quiz about AJAX.
  • akamaize - For a Web site, to akamaize (pronounced AHK-uh-myez) is to accelerate the delivery of Web files by placing copies on servers closer to the user than the server that delivers the main file for a Web page.
  • AKO - Army Knowledge Online (AKO) is the United States Army intranet.
  • alarm management - Alarm management is a system for prioritizing, grouping and classifying alerts and event notifications used in supervisory control and data acquisition (SCADA).
  • alert fatigue - Alert fatigue, also called alarm fatigue, is an instance where an overwhelming number of alerts causes an individual to become desensitized to them.
  • Alexa Blueprints - Alexa Blueprints is a set of templates that lets users create custom skills and capabilities for the Alexa personal assistant without the need for coding or technical expertise.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close