Browse Definitions :

Browse Definitions by Alphabet

JUI - JYT

  • juice jacking - Juice jacking is a security exploit in which an infected USB charging station is used to compromise connected devices.
  • Julian calendar - The Julian calendar was the 365-day calendar that Julius Caesar made official in 46 B.
  • Julian date - Not to be confused with the Julian calendar, a Julian date or day number is the number of elapsed days since the beginning of a cycle of 7,980 years invented by Joseph Scaliger in 1583.
  • jumbo frames - A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes.
  • jumbogram - Using the Internet Protocol version 6 (IPv6), a jumbogram is a transmission packet that contains a payload larger than 65,535 eight-bit bytes (also known as octet s).
  • jump drive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • jump page - In Web advertising and marketing, a jump page is a Web page that is made to appear temporarily in order to capture the user's attention as a promotion or to gather user information in a survey.
  • jumper - In a computer, a jumper is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card.
  • jumper block - In a computer, a jumper is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card.
  • jumper cable - In a computer, a jumper is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card.
  • jumper setting - In a computer, a jumper is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card.
  • JUnit - JUnit is an open source framework designed for the purpose of writing and running tests in the Java programming language.
  • junk e-mail - Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.
  • just a bunch of disks - JBOD ("just a bunch of disks") refers to a computer's hard disks that haven't been configured according to the RAID system.
  • just a bunch of drives - JBOD ("just a bunch of disks") refers to a computer's hard disks that haven't been configured according to the RAID system.
  • Just Enough Administration (JEA) - Just Enough Administration (JEA) is a PowerShell toolkit designed to help an organization reduce risk by restricting IT administrative rights.
  • just enough operating system - JeOS (just enough operating system) is a highly customized operating system built for a specific application.
  • just in case manufacturing - Just-in-case (JIC) manufacturing is the traditional model of production, in which products are created in advance and in excess of demand.
  • just in time compiler - In the Java programming language and environment, a just-in-time (JIT) compiler is a program that turns Java bytecode (a program that contains instructions that must be interpreted) into instructions that can be sent directly to the processor.
  • just in time manufacturing - Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production model).
  • just-in-case manufacturing - Just-in-case (JIC) manufacturing is the traditional model of production, in which products are created in advance and in excess of demand.
  • just-in-case manufacturing (JIC manufacturing) - Just-in-case (JIC) manufacturing is the traditional model of production, in which products are created in advance and in excess of demand.
  • just-in-time compiler - In the Java programming language and environment, a just-in-time (JIT) compiler is a program that turns Java bytecode (a program that contains instructions that must be interpreted) into instructions that can be sent directly to the processor.
  • just-in-time compiler (JIT) - A just-in-time (JIT) compiler is a program that turns bytecode into instructions that can be sent directly to a computer's processor (CPU).
  • just-in-time manufacturing - Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production model).
  • just-in-time manufacturing (JIT manufacturing) - Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production model).
  • JVM - A Java virtual machine (JVM), an implementation of the Java Virtual Machine Specification, interprets compiled Java binary code (called bytecode) for a computer's processor (or "hardware platform") so that it can perform a Java program's instructions.
  • Jython - Jython is an open source implementation of the Python programming language, integrated with the Java platform.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close