Browse Definitions :

Browse Definitions by Alphabet

HIP - HOS

  • HIPPI (High-Performance Parallel Interface) - HIPPI (High-Performance Parallel Interface) is a standard point-to-point protocol for transmitting large amounts of data at up to billions of bits per second over relatively short distances, mainly on local area networks (LAN s).
  • HiPPO (highest paid person's opinion, highest paid person in the office) - HiPPOs (highest paid person's opinions) is a term used to describe an organization's reliance on executive instinct rather than data in the decision-making process.
  • HireVue - HireVue is an enterprise video interviewing technology vendor that allows recruiters and hiring managers to screen candidates and conduct live interviews over the Internet.
  • histogram - A histogram is a display of statistical information that uses rectangles to show the frequency of data items in successive numerical intervals of equal size.
  • historical data - Historical data, in a broad context, is collected data about past events and circumstances pertaining to a particular subject.
  • history of the Internet - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • History of the punch card - Learn about the role of punch cards in the history of data and data management.
  • HIT - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • HIT policy committee - The Health Information Technology (HIT) policy committee is a federal committee created by the American Recovery and Reinvestment Act of 2009 (ARRA) that advises the National Coordinator for Health IT on the creation of a nationwide health IT infrastructure.
  • HIT standards committee - The Health Information Technology (HIT) standards committee is a federal committee created by the American Recovery and Reinvestment Act of 2009 (ARRA) that advises the National Coordinator for Health IT on matters of standards, certification criteria and other issues surrounding EHRs and meaningful use.
  • HITA - The Hospitality Information Technology Association (HITA) is an international association of hospitality educators, hardware and software vendors, information technology users, and consultants to the hospitality industry.
  • Hitachi Unified Compute Platform (Hitachi UCP) - Hitachi Unified Compute Platform (UCP) is the company's product for converged infrastructure, combining server, storage, network and software management.
  • Hitachi Vantara (formerly Hitachi Data Systems or HDS) - Hitachi Vantara is a data storage systems provider, previously known as Hitachi Data Systems (HDS).
  • Hitchhiker's Guide to the Galaxy - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.
  • HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 - The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to stimulate the adoption of electronic health records (EHR) and the supporting technology in the United States.
  • HITECH Act - The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to stimulate the adoption of electronic health records (EHR) and the supporting technology in the United States.
  • HITSP - HITSP (Healthcare Information Technology Standards Panel) is an organization created to promote standardization and broad scale interoperability among healthcare applications and information systems.
  • HKEY - Handle to Registry Key (HKEY) is a typedef supplied in the Windows headers files.
  • HL7 (Health Level Seven International) - HL7 (Health Level Seven International) is a set of standards, formats and definitions for exchanging and developing electronic health records (EHRs).
  • HLASM - High Level Assembler (HLASM) is IBM's assembler programming language and the assembler itself for the IBM z/OS, z/VM, OS/390, MVS, VM, and VSE operating systems.
  • HLD - A hardware load-balancing device (HLD), also known as a layer 4-7 router, is a physical unit that directs computers to individual servers in a network, based on factors such as server processor utilization, the number of connections to a server, or the overall server performance.
  • HLR - The Home Location Register (HLR) is the main database of permanent subscriber information for a mobile network.
  • Hm - The henry per meter (symbolized H/m) is the unit of magnetic permeability in the International System of Units (SI).
  • HMAC - Hash-based Message Authentication Code (HMAC) is a message authentication code that uses a cryptographic key in conjunction with a hash function.
  • HMIPv6 - Hierarchical Mobile IPv6 (HMIPv6) is the proposed enhancement of Mobile Internet Protocol versions 6 (MIPv6) that is designed to reduce the amount of signaling required and to improve handoffspeed for mobile connections.
  • hoax - A virus hoax is a false warning about a computer virus.
  • hockey stick growth - Hockey stick growth refers to the shape of a chart showing sudden and very rapid growth.
  • Hofstadter's law - Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.
  • holacracy - A holacracy is a governance structure characterized by a distribution of power among self-organizing groups, rather than the typical top-down hierarchical corporate culture model.
  • HOLAP - Hybrid online analytical processing (HOLAP) is a combination of relational OLAP (ROLAP) and multidimensional OLAP (usually referred to simply as OLAP).
  • hold orders - Litigation hold is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company.
  • holding company - A holding company is a business that exists for the purpose of owning other companies and typically does not produce goods or offer services other than through its subsidiaries.
  • hole - In physics, a hole is an electric charge carrier with a positive charge, equal in magnitude but opposite in polarity to the charge on the electron.
  • holistic (holistic technology) - Holistic (holistic technology) is a concept concerned with treatment of entire systems, rather than the analysis, treatment or segmentation of parts of those systems.
  • holistic security - Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system.
  • holodeck - The holodeck is an immersive virtual reality environment that was featured on Star Trek, a popular science fiction television and film series of the late 20th century.
  • hologram - A hologram (pronounced HOL-o-gram) is a three-dimensional image, created with photographic projection.
  • holographic disk drive - A holographic disk drive is a holographic storage device that uses a laser to store data to optical media in three dimensions, maximizing storage capacity by using the media's depth.
  • holographic display - A holographic display is a display that uses coherent light, such as that created by laser, to create a three-dimensional (3D) image in space.
  • holographic print - A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.
  • holographic processing unit (HPU) - Holographic processing unit (HPU) is what Microsoft has named the coprocessor in its HoloLens virtual reality (VR) headset.
  • holographic storage - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.
  • holographic storage (holostorage) - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.
  • holographic telepresence - Holographic telepresence is an evolving technology for full-motion, three-dimensional (3D) video conferencing.
  • holographic versatile disc - Holographic versatile disc (HVD) is a medium of holographic storage that looks like a DVD but is capable of storing far more data.
  • holostorage - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.
  • home agent - In Mobile Internet Protocol (Mobile IP), a home agent is a router on a mobile node's home network that maintains information about the device's current location, as identified in its care-of address.
  • Home Audio Visual - HAVi (Home Audio Visual) is a standard, developed by several leading electronics and computer manufacturers, that allows a number of different home-entertainment and communication devices to operate from a single controller device such as your TV set.
  • home building software - Home building software, also known as residential construction software, is a collection of programs, processes and information that lets residential construction contractors manage the construction process from home design and remodeling, to cost estimates and accounting, to project management and project completion.
  • home building software (residential construction software) - Home building software, also known as residential construction software, is a collection of programs, processes and information that lets residential construction contractors manage the construction process from home design and remodeling, to cost estimates and accounting, to project management and project completion.
  • Home Location Register - The Home Location Register (HLR) is the main database of permanent subscriber information for a mobile network.
  • Home Location Register (HLR) - The Home Location Register (HLR) is the main database of permanent subscriber information for a mobile network.
  • home page - For a Web user, the home page is the first Web page that is displayed after starting a Web browser like Netscape's Navigator or Microsoft's Internet Explorer.
  • Home Phoneline Networking Alliance - The HPNA (Home Phoneline Networking Alliance) is an industry group that promotes standards for using existing phone lines and jacks to interconnect computers within a home.
  • Home Phoneline Networking Alliance (HPNA) - The HPNA (Home Phoneline Networking Alliance) is an industry group that promotes standards for using existing phone lines and jacks to interconnect computers within a home.
  • home radio frequency - HomeRF (for home radio frequency) is a home networking standard developed by Proxim Inc.
  • home school - A home school is a school in which parents teach their children an academic curriculum at home instead of sending them out to a public or private school.
  • home schooling - A home school is a school in which parents teach their children an academic curriculum at home instead of sending them out to a public or private school.
  • home server - A home server is a computer that functions as a server in a client-server home network.
  • homecam - A cam, homecam, or Webcam is a video camera, usually attached directly to a computer, whose current or latest image is requestable from a Web site.
  • Homeland Security - HSPD-7 (Homeland Security Presidential Directive No.
  • Homeland Security Presidential Directive No. 7 - HSPD-7 (Homeland Security Presidential Directive No.
  • homeostasis - Homeostasis is the automatic, dynamic maintenance of the optimal internal conditions for functioning in an organism.
  • HomeRF - HomeRF (for home radio frequency) is a home networking standard developed by Proxim Inc.
  • HomeRF (home radio frequency) - HomeRF (for home radio frequency) is a home networking standard developed by Proxim Inc.
  • homomorphic encryption - Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.
  • Honey Encryption - Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key.
  • honey monkey - A honey monkey is a virtual computer system that is programmed to lure, detect, identify and neutralize malicious activity on the Internet.
  • honey pot - A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems.
  • honeynet - A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security.
  • honeypot - A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems.
  • honeypot (computing) - A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems.
  • hook - In programming, a hook is a place and usually an interface provided in packaged code that allows a programmer to insert customized programming.
  • hoot and holler - In telecommunications, a hoot-n-holler is a dedicated "always on" connection used for two-way business-to-business voice communication.
  • hoot-n-holler - In telecommunications, a hoot-n-holler is a dedicated "always on" connection used for two-way business-to-business voice communication.
  • Hootsuite - Hootsuite is a social media management system that gives users an integrated user interface from which to manage their social interactions.
  • hop - In a packet-switching network, a hop is the trip a data packet takes from one router or intermediate point to another in the network.
  • hop off - Hop off is a term used in telecommunications that refers to a point at which a signal or call leaves a network and moves to another network.
  • hopoff - Hop off is a term used in telecommunications that refers to a point at which a signal or call leaves a network and moves to another network.
  • Hopper, Grace - Grace Murray Hopper (1906-1992) was a pioneer in computer science.
  • HORNET (high-speed onion routing network) - HORNET is an anonymized and accelerated onion routing network; the name is an acronym for high speed onion routing network.
  • horsepower - The horsepower (hp) is a unit in the foot-pound-second (fps) or English system, sometimes used to express the rate at which mechanical energy is expended.
  • horsepower (hp) - The horsepower (hp) is a unit in the foot-pound-second (fps) or English system, sometimes used to express the rate at which mechanical energy is expended.
  • Hospital Compare - Hospital Compare is a website that lets consumers compare the quality of hospital outpatient services.
  • Hospitality Financial and Technology Professionals - The Hospitality Financial and Technology Professionals (HFTP) organization is an international society established in 1952 for financial and technology professionals who work in the hospitality industry.
  • Hospitality Information Technology Association - The Hospitality Information Technology Association (HITA) is an international association of hospitality educators, hardware and software vendors, information technology users, and consultants to the hospitality industry.
  • host (in computing) - A host (also known as "network host") is a computer or other device that communicates with other hosts on a network.
  • Host Analytics - Host Analytics is a provider of cloud-based corporate performance management (CPM) software.
  • host bus adapter - A host bus adapter (HBA) provides physical connectivity and input/output between a server and a network and/or storage device.
  • host bus adapter (HBA) - A host bus adapter (HBA) provides physical connectivity and input/output between a server and a network and/or storage device.
  • host file hijack - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
  • host intrusion detection systems - Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks.
  • host intrusion prevention systems (HIPS) - A host intrusion prevention system (HIPS) is a security method that relies on third-party software tools to monitor network traffic and system activities for anomalous code behavior to identify and prevent malicious activities.
  • host OS - A host OS is the software installed on a computer that interacts with the underlying hardware in a computer using virtualization technology.
  • Host OS (host operating system) - A host OS is the software installed on a computer that interacts with the underlying hardware in a computer using virtualization technology.
  • host virtual machine - A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).
  • host virtual machine (host VM) - A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).
  • host VM - A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).
  • host-based replication - Host-based replication is the processes of using servers to copy data from one site to another.
  • host-based virtual machine - A host-based virtual machine is an instance of a desktop operating system that runs on a centralized server.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close