Browse Definitions :

Browse Definitions by Alphabet

FIL - FIX

  • filesystem - In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed logically for storage and retrieval.
  • FileZilla - FileZilla is a free, open source, file transfer protocol (FTP) software tool.
  • filter - In computer programming, a filter is a program or section of code that is designed to examine each input or output request for certain qualifying criteria and then process or forward it accordingly.
  • filter bubble - A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet.
  • FIM - Federated identity management (FIM) is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.
  • Finacle - Finacle is a core banking suite developed and marketed by India's Infosys Technologies.
  • Final 4 - The Big 4, also known as the Final 4, are the four largest international accounting and professional services firms.
  • financial analytics - Financial analytics is the creation of ad hoc analysis to answer specific business questions and forecast possible future financial scenarios.
  • financial application - A financial application is a software program that facilitates the management of business processes that deal with money.
  • financial consolidation - Financial consolidation is the process of combining financial data from several departments or business entities within an organization, usually for reporting purposes.
  • financial controller - A financial controller, also referred to as financial comptroller, is a senior-level executive who usually reports to an organization's chief financial officer (CFO).
  • Financial Crimes Enforcement Network - Financial Crimes Enforcement Network (FinCEN) is a bureau of the United States Department of the Treasury.
  • Financial Crimes Enforcement Network (FinCEN) - Financial Crimes Enforcement Network (FinCEN) is a bureau of the United States Department of the Treasury.
  • financial data management - Financial data management (FDM) is a process and policy, usually assisted by specialized software, that allows an enterprise or institution to consolidate its financial information, maintain compliance with accounting rules and laws, and produce detailed financial reports.
  • Financial Industry Regulatory Authority - The Financial Industry Regulatory Authority (FINRA) is an independent regulator securities firms doing business in the United States.
  • Financial Industry Regulatory Authority (FINRA) - The Financial Industry Regulatory Authority (FINRA) is an independent regulator securities firms doing business in the United States.
  • Financial Information Exchange protocol - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • financial management system - A financial management system is the methodology and software that an organization uses to oversee and govern its income, expenses, and assets with the objectives of maximizing profits and ensuring sustainability.
  • financial modeling - Financial modeling is the construction of spreadsheet models that illustrate a company's likely financial results in quantitative terms.
  • Financial Modernization Act of 1999 - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • financial planning and analysis (FP&A) - Financial planning and analysis (FP&A) is the budgeting, forecasting and analytical processes that support an organization's financial health and business strategy.
  • Financial Products Markup Language - Financial Products Markup Language (FpML) is a business information exchange standard based on Extensible Markup Language (XML) that enables business-to-business over-the-counter (OTC) financial derivative transactions using the Internet.
  • financial reporting - Financial reporting is the process of producing the reports, called statements, that disclose an organization's financial status to management, investors and the U.
  • Financial Services Authority - The FSA (Financial Services Authority) is an independent, non-governmental body that regulates the financial services industry in the UK, including most financial services markets, exchanges and firms.
  • Financial Services Authority (FSA) - The FSA (Financial Services Authority) is an independent, non-governmental body that regulates the financial services industry in the UK, including most financial services markets, exchanges and firms.
  • Financial Services Markup Language - FSML (Financial Services Markup Language) is a data description language based on the Standard Generalized Markup Language (SGML) that was developed to create financial documents for delivery over the Internet, including eCheck and their associated documentation.
  • financial supply chain management - Financial supply chain management (FSCM) is a set of software tools and processes designed to enhance an organization’s product flow, maximizing profitability and minimizing expenses.
  • FinancialForce.com - FinancialForce is a cloud applications company that makes enterprise resource planning (ERP) software for Force.
  • FinCEN - Financial Crimes Enforcement Network (FinCEN) is a bureau of the United States Department of the Treasury.
  • Find and replace (FnR) wildcards for Microsoft Word - A list of FnR wildcards for Microsoft Word.
  • Find and replace wildcards for Microsoft Word - A list of FnR wildcards for Microsoft Word.
  • find me - Find me and follow me are two call forwarding services that are commonly used in conjunction with each other.
  • find me / follow me - Find me and follow me are two call forwarding services that are commonly used in conjunction with each other.
  • fine structure constant - The fine structure constant measures the strength of the electromagnetic forcethat controls how charged elementary particles (such as electrons and photons) interact.
  • finger - Finger is a program that tells you the name associated with an e-mail address.
  • finger image - Fingerscanning, also called fingerprint scanning, is the process of electronically obtaining and storing human fingerprints.
  • finger vein ID - Finger vein ID is a biometric authentication system that matches the vascular pattern in an individual's finger to previously obtained data.
  • fingerprint scanning - Fingerscanning, also called fingerprint scanning, is the process of electronically obtaining and storing human fingerprints.
  • fingerscanning - Fingerscanning, also called fingerprint scanning, is the process of electronically obtaining and storing human fingerprints.
  • finite capacity scheduling - In manufacturing, finite capacity scheduling is an approach to understanding how much work can be produced in a certain time period, taking limitations on different resources into consideration.
  • finite element analysis (FEA) - Finite element analysis (FEA) is the use of calculations, models and simulations to predict and understand how an object might behave under various physical conditions.
  • finite state machine - Finite state machine (FSM) is a term used by programmers, mathematicians and other professionals to describe a mathematical model for any system with a limited number of conditional states of being.
  • FinnOne - FinnOne is a web-based global banking product designed to support banks and financial solution companies in dealing with assets, liabilities, core financial accounting and customer service.
  • FinOps (FinOps Foundation) - FinOps (financial operations) is a framework for managing operating expenditures (Opex) in the cloud.
  • FINRA - The Financial Industry Regulatory Authority (FINRA) is an independent regulator securities firms doing business in the United States.
  • FinTech - FinTech (a portmanteau of financial tech) is the use of new technology and delivery models to complement or compete with traditional financial service delivery processes.
  • FiOS - FiOS (Fiber Optic Service) is a fiber to the premises (FTTP) telecommunications service offered by Verizon to consumers in the United States.
  • FiOS (Fiber Optic Service) - FiOS (Fiber Optic Service) is a fiber to the premises (FTTP) telecommunications service offered by Verizon to consumers in the United States.
  • FIP - FIP (Fair Information Practices) is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
  • FIPS - FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.
  • FIPS - Federal Information Processing Standards (FIPS) is a standard for adoption and use by United States Federal departments and agencies that has been developed within the Information Technology Laboratory and published by the National Institute of Standards and Technology (NIST), a part of the U.
  • FIPS (Federal Information Processing Standards) - FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.
  • FIPS PUB 197 - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • FIRE (Financial Independence, Retire Early) - FIRE (Financial Independence, Retire Early) is a lifestyle, also referred to as a movement, aimed at reducing expenditures and increasing investing in order to quickly gain financial independence and the possibility of retirement at an early age.
  • fire brigade attack - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • fire fighting - Firefighting is an emergency allocation of resources, required to deal with an unforeseen problem.
  • Firebase Cloud Messaging (FCM) - Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send notifications and messages to users across a variety of platforms, including Android, iOS and web applications.
  • Firecracker - Firecracker is a light-weight virtualization technology open sourced by Amazon Web Services.
  • firefighting - Firefighting is an emergency allocation of resources, required to deal with an unforeseen problem.
  • Firefox - Firefox is a Web browser that is smaller, faster, and in some ways more secure than the Netscape browser from which much of its code was derived.
  • Firefox OS - Firefox OS is a Linux-based mobile operating system designed for smartphones, tablets and smart TVs.
  • Firefox Reality - Firefox Reality is a multi-platform browser optimized for standalone VR (virtual reality), AR (augmented reality) and MR (mixed reality) headsets.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • firewall - A firewall is software or firmware that prevents unauthorized access to a network.
  • firewall as a service (FWaaS) - Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic inspection capabilities to customers seeking to decommission or augment their existing network firewall appliances.
  • Firewall Builder - Firewall Builder, also called Fwbuilder, is a vendor-neutral configuration and management application for firewalls that is intended primarily for Linux and that supports the OpenBSD Packet Filter, Cisco PIX Series security devices, iptables, and ipfilter.
  • FirewallD - FirewallD, also known as Dynamic Firewall, replaces Fedora's old firewall tool, iptables, and allows for easier configuration and interface.
  • FireWire - FireWire is Apple Computer's version of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
  • firmographic data - Firmographic data is types of information that can be used to categorize organizations, such as location, name, number of clients, industry and so on.
  • firmware - Firmware is programming that's written to the non-volatile memory of a hardware device.
  • First Amendment of the Internet - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • First Amendment to the Constitution - The First Amendment to the United States Constitution is one of a group of ten additions to the original document that provided a framework for law within the country.
  • first call resolution - In customer relationship management (CRM), first call resolution is properly addressing the customer's need the first time they call, thereby eliminating the need for the customer to follow up with a second call.
  • first call resolution (FCR) - In customer relationship management (CRM), first call resolution is properly addressing the customer's need the first time they call, thereby eliminating the need for the customer to follow up with a second call.
  • first computer virus - Elk Cloner was the first computer virus known to have spread in the wild.
  • first follower theory - First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general population.
  • first in first out - In computer programming, FIFO (first-in, first-out) is an approach to handling program work requests from queues or stacks so that the oldest request is handled next.
  • first-order logic - First-order logic is symbolized reasoning in which each sentence, or statement, is broken down into a subject and a predicate.
  • first-order predicate calculus - Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
  • first-person view (FPV) - First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.
  • Firstsource Solutions - Firstsource Solutions (BSE / NSE: FSL) is a Mumbai-based provider of business process outsourcing (BPO) services.
  • fiscal quarter - A fiscal quarter is one of the four three-month periods that make up an organization’s fiscal year.
  • fiscal year - A fiscal year is the twelve-month period that an organization uses for budgeting, forecasting and reporting.
  • fishbone diagram (Ishikawa cause and effect) - A fishbone diagram is a visualization tool for categorizing the potential root causes of a problem.
  • fishing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • FISMA - The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and security standards to protect government information, operations and assets.
  • fist of five - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • fist to five - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • fist to five (fist of five) - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • FITCE - FITCE (Federation of Telecommunications Engineers of the European Community) is an international association that is committed to affecting telecommunication developments in a positive and constructive manner throughout Europe and the rest of the world.
  • five 9s - In computers, 99.
  • Five Eyes Alliance - The Five Eyes Alliance (abbreviated as FVEY in government documents) is a cooperative intelligence network that monitors the electronic communications of citizens and foreign governments.
  • five nines - In computers, 99.
  • Five Steps to Incident Management in a Virtualized Environment - Incident management (IM) is a necessary part of a security program.
  • fix - A software patch or fix helps resolve issues that crop up in different programs.
  • FIX protocol - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • fixed data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • fixed data (permanent data, reference data, archival data, or fixed-content data) - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • fixed length subnet mask - A fixed-length subnet mask (FLSM) is a sequence of numbers of unchanging length that streamlines packet routing within the subnets of a proprietary network.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close