Browse Definitions :

Browse Definitions by Alphabet

H - HAR

  • H - The henry (symbolized H) is the Standard International (SI) unit of inductance.
  • H-1B - H-1B is a United States Immigration Service visa classification that permits employers to hire highly skilled foreign workers who possess theoretical and practical application of a body of specialized knowledge.
  • H.245 - H.245 is a protocol for the transmission of call management and control signals in packet-based networks using H.
  • H.248 - Media Gateway Control Protocol (MGCP), also known as H.
  • H.264 - H.264, also known as MPEG-4 AVC (Advanced Video Coding), is a video compression standard that offers significantly greater compression than its predecessors.
  • H.264 (MPEG-4 AVC) - H.264, also known as MPEG-4 AVC (Advanced Video Coding), is a video compression standard that offers significantly greater compression than its predecessors.
  • H.323 - H.323 is a standard approved by the International Telecommunication Union (ITU) in 1996 to promote compatibility in videoconference transmissions over IP networks.
  • H.R. 744 - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
  • H.R.5744 - The Securing Knowledge, Innovation and Leadership Act, also called the SKIL Bill, was introduced in 2006 by the United States (U.
  • H/m - The henry per meter (symbolized H/m) is the unit of magnetic permeability in the International System of Units (SI).
  • h2g2 - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.
  • HA - In information technology, high availability refers to a system or component that is continuously operational for a desirably long length of time.
  • HA storage (high-availability storage) - High-availability storage (HA storage) is a storage system that is continuously operational or provides at least 99% uptime.
  • HaaS - Hardware as a Service (HaaS) is a service provision model for hardware that is defined differently in managed services and grid computing contexts.
  • hackathon - A hackathon, also known as a codefest, is a social coding event that brings computer programmers and other interested people together to improve upon or build a new software program.
  • hacker - A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
  • hackerazzi - Hackerazzi are cybercriminals who hack into the email accounts of celebrities to access and exploit their private information.
  • hacking as a service (HaaS) - Hacking as a service (HaaS) is the commercialization of hacking skills, in which the hacker serves as a contractor.
  • hacktivism - Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.
  • hacktivist - Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
  • Hadoop 2 - Apache Hadoop 2 is the second iteration of the Hadoop framework for distributed data processing.
  • Hadoop as a service (HaaS) - Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in the cloud using Hadoop.
  • Hadoop cluster - A Hadoop cluster is a special type of computational cluster designed specifically for storing and analyzing huge amounts of unstructured data in a distributed computing environment.
  • Hadoop data lake - A Hadoop data lake is a data management platform comprising one or more Hadoop clusters.
  • Hadoop Distributed File System (HDFS) - The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications.
  • haiku error message - A haiku error message is a poem in the Japanese form on a page advising the user that an Internet problem, such as a 404 error, means that their request cannot be satisfied.
  • HailStorm - Part of Microsoft's .
  • hairpin - In general telecommunication, hairpinning is returning a message from an origin endpoint back in the direction it came from as a way to get it to its destination endpoint.
  • hairpinning - In general telecommunication, hairpinning is returning a message from an origin endpoint back in the direction it came from as a way to get it to its destination endpoint.
  • hakspeak - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • HAL - In computers, a hardware abstraction layer (HAL) is a layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level.
  • half duplex - Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time.
  • half life - In science, a half-life (also, as a noun, spelled half life) is the amount of time it takes for half of a substance or entity to undergo some specified process.
  • half-duplex - Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time.
  • half-life - In science, a half-life (also, as a noun, spelled half life) is the amount of time it takes for half of a substance or entity to undergo some specified process.
  • half-open scanning - SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection.
  • Hall effect - The Hall effect is the movement of charge carriers through a conductor towards a magnetic attraction.
  • Halloween II: Do you speak -- eek! -- Geek? - A WhatIs.com tech quiz with a Halloween theme: Does Nightmare Freddie of Elm Street fame use one of these for manicures? It's a type of space-saving server for a single, dedicated application.
  • Halloween: Do you speak geek? - A tech trivia quiz with a Halloween theme: White words on a blue background: your system has crashed.
  • HALO - A HALO (High Altitude Long Operation) aircraft is an aircraft designed to act as a very high altitude receiving and transmitting tower, circling a metropolitan area and providing broadband telecommunication service at data rates up to 5 Mbps to homes and up to 25 Mbps to business users with dedicated lines.
  • HALO (High Altitude Long Operation) - A HALO (High Altitude Long Operation) aircraft is an aircraft designed to act as a very high altitude receiving and transmitting tower, circling a metropolitan area and providing broadband telecommunication service at data rates up to 5 Mbps to homes and up to 25 Mbps to business users with dedicated lines.
  • halo effect - The halo effect is a form of cognitive bias which causes one part to make the whole seem more attractive or desirable.
  • Halogen Software Inc. - Halogen Software Inc.
  • ham - Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.
  • ham radio - Amateur radio, also known as ham radio, is a hobby enjoyed by several hundred thousand people in the United States and by over a million people worldwide.
  • hamburger icon (slide drawer navigation) - The hamburger icon got its name because it resembles a burger in a bun.
  • Hamming code - Hamming code is a set of error-correction codes that can be used to detect and correct bit errors that can occur when computer data is moved or stored.
  • HANA - SAP HANA is a data warehouse appliance for processing high volumes of operational and transactional data in real-time.
  • Hancock - Hancock is a C-based programming language developed by AT&T specifically for data mining telephone and Internet records.
  • Hand of Thief - Hand of Thief is banking crimeware that targets Linux operating systems.
  • handheld - A handheld computer is a computer that can conveniently be stored in a pocket (of sufficient size) and used while you're holding it.
  • handheld - A handie talkie, often referred to by its abbreviation, HT, is a handheld, portable two-way radio transceiver.
  • Handheld Device Markup Language - HDML (Handheld Device Markup Language) - often compared to Wireless Markup Language (WML) - is a language that allows the text portions of Web pages to be presented on cellular telephones and personal digital assistants (PDA) via wireless access.
  • handheld keyboard - A portable keyboard (or handheld keyboard) is one that is designed to be used with wireless devices, such as personal digital assistants (PDAs) and smartphones.
  • handie talkie - A handie talkie, often referred to by its abbreviation, HT, is a handheld, portable two-way radio transceiver.
  • handie talkie (HT, walkie talkie, handheld) - A handie talkie, often referred to by its abbreviation, HT, is a handheld, portable two-way radio transceiver.
  • Handle to Registry Key - Handle to Registry Key (HKEY) is a typedef supplied in the Windows headers files.
  • Handle to Registry Key (HKEY) - Handle to Registry Key (HKEY) is a typedef supplied in the Windows headers files.
  • handoff - In a cellular telephone network, handoff is the transition for any given user of signal transmission from one base station to a geographically adjacent base station as the user moves around.
  • hands-off infrastructure management - Hands-off infrastructure management is the remote, automated administration of server, storage and network resources.
  • handshake - In telephone communication, handshaking is the exchange of information between two modems and the resulting agreement about which protocol to use that precedes each telephone connection.
  • handshaking - In telephone communication, handshaking is the exchange of information between two modems and the resulting agreement about which protocol to use that precedes each telephone connection.
  • Handspring - Handspring was a company that manufactured portable computer/organizer hardware.
  • handtop - A handtop is a full-featured portable computer that is slightly larger than a PDA, but much smaller than a laptop.
  • handtop (ultra personal computer) - A handtop is a full-featured portable computer that is slightly larger than a PDA, but much smaller than a laptop.
  • hang - A hangup, also called a hang, is a condition that sometimes occurs when computer programs conflict or do not run properly.
  • hangup - A hangup, also called a hang, is a condition that sometimes occurs when computer programs conflict or do not run properly.
  • hangup (or hang) - A hangup, also called a hang, is a condition that sometimes occurs when computer programs conflict or do not run properly.
  • Happy Hour Virus - Happy Hour Virus is a web app that makes the user's computer appear to be compromised by malware and, as a result, not working.
  • happy path testing - Happy-path testing is a type of software testing that uses known input and produces an expected output.
  • HAProxy - HAProxy (High Availability Proxy), developed by HAProxy Technologies LLC, is an open source load balancer proxy for TCP and HTTP applications.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • hard bounce - A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid.
  • hard copy - A hard copy (or "hardcopy") is a printed copy of information from a computer.
  • hard copy (printout) - A hard copy (or "hardcopy") is a printed copy of information from a computer.
  • hard disk - A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface or set of surfaces.
  • hard disk drive - Hard disk drives are a type of physical storage media that use spinning disk platters to store nonsequential data in personal computers and enterprise data centers.
  • hard disk drive (HDD) - A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of the hard disk, which furnishes data storage.
  • hard drive - Hard disk drives are a type of physical storage media that use spinning disk platters to store nonsequential data in personal computers and enterprise data centers.
  • hard drive overwrite - In e-cycling, a hard drive overwriter is a program or utility that repeatedly overwrites the data on a computer's hard drive with gibberish.
  • hard drive overwriter - In e-cycling, a hard drive overwriter is a program or utility that repeatedly overwrites the data on a computer's hard drive with gibberish.
  • hard drive shredder - A hard drive shredder is a mechanical device that physically destroys old hard drives in such a way that the data they contain cannot be recovered.
  • hard error - A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.
  • hard phone - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • hard real time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • hard real-time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • hard real-time system (immediate real-time system) - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory.
  • hard skills - Hard skills are specific abilities, or capabilities, that an individual can possess and demonstrate in a measured way.
  • hard zoning - Hard zoning is used to allocate resources and control access in a storage-area network (SAN).
  • hard-drive encryption - Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.
  • hardcode - In computer programming or text markup, to hardcode (less frequently, hard code) is to use an explicit rather than a symbolic name for something that is likely to change at a later time.
  • hardphone - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • Hardware 101 - Test yourself.
  • hardware abstraction layer - In computers, a hardware abstraction layer (HAL) is a layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level.
  • hardware abstraction layer (HAL) - In computers, a hardware abstraction layer (HAL) is a layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level.
  • Hardware as a Service - Hardware as a Service (Haas), in a grid computing context, is a pay-as-you-go model for accessing a provider's infrastructure and CPU power.
  • Hardware as a Service - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing.
  • Hardware as a Service - Hardware as a Service (HaaS) is a service provision model for hardware that is defined differently in managed services and grid computing contexts.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close