Browse Definitions :

Browse Definitions by Alphabet

HYP - WHA

  • Hyper-V Replica - Hyper-V Replica is a free disaster recovery tool in Hyper-V 3.
  • Hyper-V Virtual Fibre Channel - Virtual Fibre Channel is a feature in Microsoft Hyper-V 3.
  • hyperautomation - Hyperautomation is a framework and set of advanced technologies for scaling automation in the enterprise; the ultimate goal of hyperautomation is to develop a process for automating enterprise automation.
  • hyperconnectivity - Hyperconnectivity is a state of unified communications (UC) in which the traffic-handling capacity and bandwidth of a network always exceed the demand.
  • HyperGrid - HyperGrid is a cloud computing provider that offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and application management services.
  • HyperLAN - MEO satellite"HiperLAN is a set of wireless local area network (WLAN) communication standards primarily used in European countries.
  • Hyperledger - Hyperledger is an open source project created to support the development of blockchain-based distributed ledgers.
  • hyperlink - On the Web or other hypertext systems, hyperlink is a synonym for both link and hypertext link.
  • hypermedia - Hypermedia, a term derived from hypertext, extends the notion of the hypertext link to include links among any set of multimedia objects, including sound, motion video, and virtual reality.
  • hyperscale computing - Hyperscale computing is a distributed computing environment in which the volume of data and the demand for certain types of workloads can increase exponentially yet still be accommodated in a cost-effective manner.
  • hyperscale storage - Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely.
  • Hypersonic Sound - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
  • hyperspace - Hyperspace is a term that describes the total number of individual locations and all of their interconnections in a hypertext environment.
  • HyperTerminal - HyperTerminal is a communications and terminal emulation program that came with the Windows 98 and Windows XP operating systems.
  • hypertext - Hypertext is the organization of information units into connected associations that a user can choose to make.
  • Hypertext Markup Language - HTML (Hypertext Markup Language) is a text-based approach to describing how content contained within an HTML file is structured.
  • Hypertext Preprocessor - PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers.
  • Hypertext Transfer Protocol - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
  • Hypertext Transfer Protocol 1.1 - HTTP 1.1 is the latest version of Hypertext Transfer Protocol (HTTP), the World Wide Web application protocol that runs on top of the Internet's TCP/IP suite of protocols.
  • Hypertext Transfer Protocol daemon - On the Web, each server has an HTTPD or Hypertext Transfer Protocol daemon that waits in attendance for requests to come in from the rest of the Web.
  • Hypertext Transfer Protocol daemon (HTTPD) - On the Web, each server has an HTTPD or Hypertext Transfer Protocol daemon that waits in attendance for requests to come in from the rest of the Web.
  • hypervisor - A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.
  • hypervisor attack - A hypervisor attack can allow hackers to take control of your VMs.
  • hypervisor security - Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.
  • hypothesis - A hypothesis (plural: hypotheses) is a statement that may be tested and proven to be either true or false.
  • hysteresis - Hysteresis is the tendency for a system to change or react based on a trend of how it has already transformed leading up to a specific point in time.
  • Hz - Hertz is a unit of frequency (of change in state or cycle in a sound wave, alternating current, or other cyclical waveform) of one cycle per second.
  • network hub - A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
  • SAP HANA - SAP HANA is an in-memory database and application development platform for processing high volumes of data in real time.
  • Unified Functioning Testing Certification - Unified Functional Testing (UFT) Certification is a Hewlett Packard Enteprise program designed to ensure that trained IT professionals have comprehensive knowledge of HP’s testing automation software.
  • What is hybrid cloud? Everything you need to know - A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between these platforms.
  • What is hyper-converged infrastructure? Guide to HCI - Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close