Browse Definitions :

Browse Definitions by Alphabet

AID - AMA

  • AIDC - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • AIFF - AIFF (Audio Interchange File Format) is one of the two most-used audio file formats used in the Apple Macintosh operating system.
  • AIFF (Audio Interchange File Format) - AIFF (Audio Interchange File Format) is one of the two most-used audio file formats used in the Apple Macintosh operating system.
  • AIM - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • AIN - The Advanced Intelligent Network (AIN) is a telephone network architecture that separates service logic from switching equipment, allowing new services to be added without having to redesign switches to support new services.
  • AIOps (artificial intelligence for IT operations) - Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning (ML) and other artificial intelligence (AI) technologies to automate the identification and resolution of common information technology (IT) issues.
  • air conditioning - HVAC stands for heating, ventilation, and air conditioning.
  • air gapping (air gap attack) - Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.
  • air interface - In cellular telephone communications, the air interface is the radio-frequency portion of the circuit between the cellular phone set or wireless modem (usually portable or mobile) and the active base station.
  • Airborne Internet - The Airborne Internet is a proposed network intended for use in aviation communications, navigation, and surveillance (CNS).
  • Airborne Internet (A.I.) - The Airborne Internet is a proposed network intended for use in aviation communications, navigation, and surveillance (CNS).
  • AirChat - AirChat is an anonymous wireless communications and connectivity tool that works without any wireless infrastructure.
  • airplane mode - Airplane mode is a setting on cell phones, smartphones and other mobile communication devices that prevents the device from sending or receiving calls and text messages.
  • AIT - AIT (advanced intelligent tape) is a magnetic tape and drive system used for computer data storage and archiving.
  • AIT (advanced intelligent tape) - AIT (advanced intelligent tape) is a magnetic tape and drive system used for computer data storage and archiving.
  • AIX - AIX is an open operating system from IBM that is based on a version of UNIX.
  • AIX (Advanced Interactive eXecutive) - AIX is an open operating system from IBM that is based on a version of UNIX.
  • Ajax - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • Ajax Cheat Sheets - We've gathered cheat sheets for fast reference to Ajax-related information.
  • Ajax quiz: Do you speak Geek? - A quiz about AJAX.
  • akamaize - For a Web site, to akamaize (pronounced AHK-uh-myez) is to accelerate the delivery of Web files by placing copies on servers closer to the user than the server that delivers the main file for a Web page.
  • AKO - Army Knowledge Online (AKO) is the United States Army intranet.
  • alarm management - Alarm management is a system for prioritizing, grouping and classifying alerts and event notifications used in supervisory control and data acquisition (SCADA).
  • ALE - Application Link Enabling (ALE) is a mechanism for the exchange of business data between loosely-coupled R/3 applications built by customers of SAP, the enterprise resource management program.
  • aleph - In mathematics, aleph, the first letter of the Hebrew alphabet, in its uppercase form () denotes numbers representing the sizes of infinite set s.
  • Alesis Digital Audio Tape - The ADAT (a registered trademark of Alesis) is an eight-track digital tape recorder that caught the recording industry by storm when it was first released in the early 1990s.
  • Alexa Blueprints - Alexa Blueprints is a set of templates that lets users create custom skills and capabilities for the Alexa personal assistant without the need for coding or technical expertise.
  • Alexa Internet - Alexa Internet, often referred to simply as Alexa, is a Web traffic information, metrics and analytics provider.
  • Alexa Skills Kit - The Alexa Skills Kit is a software development kit (SDK) that enables a developer to build skills, also called conversational applications, on the Amazon Alexa artificial intelligence assistant.
  • Alexa Top Sites - Alexa Top Sites is an Amazon Web Service (AWS) that provides lists of the highest-performing websites according to Alexa Traffic Rank algorithm.
  • Alexa Voice Services (AVS) - Alexa Voice Service (AVS) is Amazon's suite of services built around its voice-controlled AI assistant for the home or other environments.
  • Alexa Web Information Service (AWIS) - Alexa Web Information Service (AWIS) is a subscription-based service that makes it possible for developers to access Alexa Web traffic data for inclusion in their XML-based websites and applications.
  • Alexander B. Howard, Associate Editor - BIO.
  • algebraic number - An algebraic number is any real number that is a solution of some single-variable polynomial equation whose coefficients are all integers.
  • algorithm - An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.
  • algorithmic accountability - Algorithmic accountability is the concept that companies should be held responsible for the results of their programmed algorithms.
  • algorithmic transparency - Algorithmic transparency is openness about the purpose, structure and underlying actions of the algorithms used to search for, process and deliver information.
  • alias - In general, as a noun, an alias (pronounced AY-lee-uhs) is an alternate name for someone or something.
  • aliasing - In sound and image generation, aliasing is the generation of a false (alias) frequency along with the correct one when doing frequency sampling.
  • Alibaba Holding Group Limited - Alibaba Group Holding Limited is a Chinese business conglomerate that runs the world’s largest retailer and one of the largest online e-commerce sites in the world, Alibaba.
  • Alice and Bob - Alice and Bob are commonly-used names for participants in security scenarios that involve cryptography.
  • alien crosstalk - Alien crosstalk (AXT) is electromagnetic noise that can occur in a cable that runs alongside one or more other signal-carrying cables.
  • alien crosstalk (AXT) - Alien crosstalk (AXT) is electromagnetic noise that can occur in a cable that runs alongside one or more other signal-carrying cables.
  • ALL - Cheat sheet quick look-ups for technology short-cuts, tips and tricks.
  • All Categories: - A list of categories.
  • All our Information Kits - We've gathered a collection of resources to help you explore an IT topic you might not know much about.
  • all-flash array (AFA) - An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash media for persistent storage.
  • Allied Digital Services Ltd - Allied Digital Services Ltd is a Mumbai-based provider of system integration and IT infrastructure support services.
  • Allscripts - Allscripts is a vendor of electronic health record systems for physician practices, hospitals and healthcare systems.
  • ALM - Application lifecycle management (ALM) is the supervision of a software application from its initial planning through retirement.
  • Aloha - Aloha, also called the Aloha method, refers toa simple communications scheme in which each source (transmitter) in a network sends data wheneverthere is a frame to send.
  • Aloha (Aloha method) - Aloha, also called the Aloha method, refers toa simple communications scheme in which each source (transmitter) in a network sends data wheneverthere is a frame to send.
  • Aloha method - Aloha, also called the Aloha method, refers toa simple communications scheme in which each source (transmitter) in a network sends data wheneverthere is a frame to send.
  • Alohanet - Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol -- a set of rules or common network language.
  • Alpha - Alpha is both a microprocessor and the name of a computer system from the Digital Equipment Corporation (DEC), which is now part of Compaq.
  • alpha testing - Alpha testing is the initial phase of validating whether a new product will perform as expected.
  • Alpha TransForm (Alpha Software) - Alpha TransForm is a mobile app development and deployment platform that allows developers and individuals to build and deploy mobile apps that can be integrated into enterprise workflows.
  • Alphabet, Inc. - Alphabet, Inc.
  • AlphaGo - AlphaGo is an artificial intelligence agent that is specialized to play Go, a Chinese game of strategy, against human competitors.
  • alphameric - In computers designed for English language users, alphanumeric (sometimes seen as alphameric) characters are those comprised by the combined set of the 26 alphabetic characters, A to Z, and the 10 Arabic numerals, 0 to 9.
  • alphanumeric - In computers designed for English language users, alphanumeric (sometimes seen as alphameric) characters are those comprised by the combined set of the 26 alphabetic characters, A to Z, and the 10 Arabic numerals, 0 to 9.
  • alphanumeric (alphameric) - Alphanumeric, also referred to as alphameric, is a term that encompasses all of the letters and numerals in a given language set.
  • Alphanumerish - Alphanumerish is a term coined to define the shorthand typing language that has developed from computer users' habit of substituting numerals for letters and substituting both letters and numerals for words or word parts.
  • Alpine Linux - Alpine Linux is a small, security-oriented, lightweight Linux distribution based on the musl libc library and BusyBox utilities platform instead of GNU.
  • ALPR - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • alt group - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • alt text (alternative text) - Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image.
  • alt. - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • Altair - The Altair was the world's first personal computer (PC) to attract a substantial number of users.
  • AltaVista - AltaVista is an Internet search engine.
  • altcoin - An altcoin is any digital cryptocurrency similar to Bitcoin.
  • altdot - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • alternate data stream - An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title.
  • alternate data stream (ADS) - An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title.
  • alternate newsgroup - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • alternate newsgroup (alt.) - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • alternating current - In electricity, alternating current (AC) occurs when charge carriers in a conductor or semiconductor periodically reverse their direction of movement.
  • alternating current (AC) - In electricity, alternating current (AC) occurs when charge carriers in a conductor or semiconductor periodically reverse their direction of movement.
  • alternative data - Alternative data is information gathered from non-traditional information sources.
  • alternative fuel vehicle (AFV) - An alternative fuel vehicle (AFV) is a vehicle that runs on substances other than the conventional petroleum gas and diesel.
  • Altman Z-score - The Altman Z-score is a statistic that is useful for evaluating the financial health of a publicly traded manufacturing company.
  • ALU - An arithmetic-logic unit (ALU) is the part of a computer processor (CPU) that carries out arithmetic and logic operations on the operands in computer instruction words.
  • aluminum battery - Aluminum batteries run longer on a charge than lithium ion batteries and are safer in use.
  • alureon - TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.
  • AlwaysOn Availability Groups - AlwaysOn Availability Groups is a database mirroring technique for Microsoft SQL Server that allows administrators to pull together a group of user databases that can fail over together.
  • AM - Modulation is the addition of information (or the signal) to an electronic or optical signal carrier.
  • Amalga - Amalga is a health IT data integration platform designed to retrieve and display healthcare-related information from various sources, including scanned documents, lab results, dictated notes and images such as X-rays, EKGs and MRIs.
  • amateur radio - Amateur radio, also known as ham radio, is a hobby enjoyed by several hundred thousand people in the United States and by over a million people worldwide.
  • amateur radio (ham radio) - Amateur radio, also known as ham radio, is a hobby enjoyed by several hundred thousand people in the United States and by over a million people worldwide.
  • amateur teleprinting over radio - AMTOR (amateur teleprinting over radio) is a digital communications method used by radio amateurs, in which the frequency of errors is reduced by handshaking or character repetition.
  • Amaya - Amaya is the Web browser that was developed by members of the World Wide Web Consortium (W3C) as a practical tool as well as a testing ground for W3C ideas.
  • Amazon - Amazon is the world’s largest online retailer.
  • Amazon AI - Amazon AI is a set of artificial intelligence services that offer machine and deep learning technologies for Amazon Web Services (AWS) developers and users.
  • Amazon API Gateway - Amazon API Gateway in an Amazon Web Services (AWS) product that allows a developer to connect non-AWS applications to AWS back-end resources, such as servers or code.
  • Amazon AppStream - Amazon AppStream is an Amazon Web Service (AWS) that enables compute-intensive applications to be streamed from the cloud to computing devices of all types.
  • Amazon Athena - Amazon Athena is a service that enables a data analyst to perform interactive queries in the Amazon Web Services public cloud on data stored in Amazon Simple Storage Service (S3).
  • Amazon Aurora - Amazon Aurora is a relational database engine from Amazon Web Services.
  • Amazon Chime - Amazon Chime is a real-time audio, video conferencing and collaboration service hosted by Amazon Web Services (AWS).
  • Amazon Cloud Directory - Amazon Cloud Directory is a service that enables an IT team to build cloud-native directories in the Amazon Web Services (AWS) public cloud.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close