Browse Definitions :

Browse Definitions by Alphabet

MOB - MOD

  • mobile device management software - Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.
  • Mobile device security quiz answers - Test yourself.
  • mobile enterprise application platform - A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.
  • mobile enterprise application platform (MEAP) - A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.
  • mobile expense management - Mobile expense management is the processes, assisted by specialized software, that an organization uses to manage the costs of its mobile communications network.
  • mobile experience - Mobile experience, or mobile user experience (UX), is the practice of fostering a certain user perception before, during and after the interaction with a mobile product or offering.
  • mobile first - Mobile first is an approach to business process and technology that assumes smartphones, tablets and task-specific apps are employees' primary tools for getting work done.
  • mobile governance - Mobile governance refers to the processes and policies used to manage mobile device access to an organization's network or its data.
  • mobile hotspot - A mobile hotspot is an ad hoc wireless access point that is created by a dedicated hardware device or a smartphone feature that shares the phone's cellular data.
  • mobile information management (MIM) - Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.
  • mobile Internet device - The mobile Internet device (MID) is a mini-tablet communications unit aimed at the consumer market and designed to provide entertainment, information and location-based services.
  • mobile Internet device (MID) - A mobile Internet device (MID) is a handheld device that is larger than a smartphone but smaller than a netbook.
  • mobile Internet device (MID) - The mobile Internet device (MID) is a mini-tablet communications unit aimed at the consumer market and designed to provide entertainment, information and location-based services.
  • Mobile Internet Protocol version 6 - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • Mobile IP - Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address.
  • Mobile IPv6 - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • Mobile IPv6 (MIPv6 or Mobile Internet Protocol version 6) - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • mobile IT (mobile information technology) - Mobile IT (mobile information technology) is the ability of IT departments to deliver enterprise information technology solutions to employees working anywhere on any device.
  • mobile location analytics (MLA) - Mobile location analytics is a method used by retailers to track the movements of shoppers throughout their stores.
  • mobile malware - Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.
  • mobile marketing - Mobile marketing is promotional activity designed for delivery to cell phones, smart phones and other handheld devices, usually as a component of a multi-channel campaign.
  • mobile middleware - Mobile middleware is software that connects disparate mobile applications, programs and systems.
  • mobile node - A mobile node is an Internet-connected device whose location and point of attachment to the Internet may frequently be changed.
  • mobile number portability - Mobile number portability (MNP) is a service that allows a cellphone or smartphone customer to change service providers and keep the same phone number.
  • mobile number portability (MNP) - Mobile number portability (MNP) is a service that allows a cellphone or smartphone customer to change service providers and keep the same phone number.
  • mobile number privacy - Mobile number privacy is the protection of the phone user’s number from unwanted access.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile payment - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile payment (m-payment) - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile phone - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
  • mobile phone spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • mobile phone virus - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • mobile phone worm - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • mobile platform as a service (MPaaS) - Mobile Platform as a Service (mPaaS) is the paid provision of an Interactive Development Environment (IDE) for the creation of mobile apps.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile productivity app (mobile productivity application) - A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks.
  • mobile robot (mobile robotics) - A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
  • mobile satellite services - Mobile satellite services (MSS) refers to networks of communications satellites intended for use with mobile and portable wireless telephones.
  • mobile satellite services (MSS) - Mobile satellite services (MSS) refers to networks of communications satellites intended for use with mobile and portable wireless telephones.
  • mobile search - Mobile search is the practice of querying a search engine from an Internet-connected handheld device, such as a smart phone.
  • mobile security (wireless security) - Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • mobile security certification - A mobile security certification is a formalized program that verifies the participant’s competency in tasks related to mobile security and administration.
  • Mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • mobile spyware - Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.
  • mobile telephone - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
  • Mobile Telephony Glossary - A glossary of mobile technology terms with brief definitions linked to more in-depth description.
  • Mobile Telephony: Do you speak Geek on the phone? - Vocabulary - Test your knowledge of mobile telephony by taking the following quiz.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile ticketing - Mobile ticketing is the purchase of admission to events through a mobile device, including the delivery of digital tickets to a smartphone for use in place of traditional paper tickets.
  • mobile to mobile convergence - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • mobile UI (mobile user interface) - A mobile UI is the user interface on a mobile device, usually including a touch screen display and all the other elements of the device that allow the user to interact with it.
  • Mobile Veepers - Veepers is a product that is used to animate digital images of people (or other creatures) for video presentations in which the characters appear to talk.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a services provider in the mobile device industry that provides wireless communications services including voice and data to customers over a wireless network infrastructure owned by a third-party mobile network operator (MNO).
  • mobile virtual private network - A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a virtual private network (VPN) or an intranet while moving from one place to another.
  • mobile virtualization - Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device.
  • mobile VPN - A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a virtual private network (VPN) or an intranet while moving from one place to another.
  • mobile VPN (mobile virtual private network) - A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a virtual private network (VPN) or an intranet while moving from one place to another.
  • mobile wallet - .
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • mobile workstation - A mobile workstation is a notebook computer with high-end computing features not typical of the notebook.
  • mobile-to-mobile convergence - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • mobile-to-mobile convergence (MMC) - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • MobileIron - MobileIron is a company that provides management and security software for mobile apps, content and devices.
  • Mobileye - Mobileye is a machine vision-based assisted driving and accident prevention system and Intel-owned company of the same name.
  • mobility agent - In Mobile Internet Protocol (Mobile IP), a mobility agent is a router that facilitates Internet traffic forwarding for a mobile node when its location is changed to somewhere other than its home network.
  • Mobitex - Mobitex is a wireless network architecture that specifies a framework for the fixed equipment necessary to support all the wireless terminals in a packet-switched, radio-based communication system.
  • moblog - A moblog (mobile blog) is a blog that is maintained by using a mobile device such as a PDA (personal digital assistant) or cell phone.
  • moblog (mobile blog) - A moblog (mobile blog) is a blog that is maintained by using a mobile device such as a PDA (personal digital assistant) or cell phone.
  • moblogging - A moblog (mobile blog) is a blog that is maintained by using a mobile device such as a PDA (personal digital assistant) or cell phone.
  • mobo - Mobo is a short form for motherboard that is sometimes used in Usenet newsgroups and Web forum discussions.
  • mobo (motherboard) - Mobo is a short form for motherboard that is sometimes used in Usenet newsgroups and Web forum discussions.
  • mobster - A flash mob is a group of strangers who organize themselves, using electronic media such as cell phones or the Internet, to gather together in a public place, behave in a predetermined (and often silly) manner for a predetermined amount of time, and then quickly disperse.
  • mock object - In object-oriented programming, a mock object is a simulated object that mimics the behavior of the smallest testable parts of an application in controlled ways.
  • mode (statistical) - The terms mean, median, mode, and range describe properties of statistical distributions.
  • model driven development - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model of reflection - A model of reflection is a structured process that is used to guide personal and situational analysis and improvement.
  • model view controller - In object-oriented programming development, model-view-controller (MVC) is the name of a methodology or design pattern for successfully and efficiently relating the user interface to underlying data models.
  • model-based enterprise - Model-based enterprise (MBE) is an engineering strategy that aims to clarify design intent during the manufacturing process, resulting in better quality of the products, reduced costs and more efficiency.
  • model-based testing - Model-based testing (MBT) requires a test team to create a second, lightweight implementation of a software build- typically only the business logic - called the model.
  • model-driven development - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model-driven development (MDD) - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model-view-controller - In object-oriented programming development, model-view-controller (MVC) is the name of a methodology or design pattern for successfully and efficiently relating the user interface to underlying data models.
  • model-view-controller (MVC) - In object-oriented programming development, model-view-controller (MVC) is the name of a methodology or design pattern for successfully and efficiently relating the user interface to underlying data models.
  • Model-View-ViewModel (MVVM) - Model-View-ViewModel (MVVM) is a software design pattern that is structured to separate program logic and user interface controls.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • ModelOps (model operations) - ModelOps (model operations) is a holistic approach to enable analytics models to progress from the lab to production so that they can be scaled and managed to meet organizations' demand.
  • modem - A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
  • modem bonding - Modem doubling is an inexpensive way for a user who wants a fast Internet connection, but can only connect with an analog telephone line, to use two 56kbps modems to double their bandwidth.
  • modem error-correcting protocols - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • modem lights - This page provides a description of the abbreviations and meanings of each of the lights that describe the "handshaking" between a computer modem and the UART chip in a computer.
  • modem lights (AA) - This page provides a description of the abbreviations and meanings of each of the lights that describe the "handshaking" between a computer modem and the UART chip in a computer.
  • modem teaming - Modem doubling is an inexpensive way for a user who wants a fast Internet connection, but can only connect with an analog telephone line, to use two 56kbps modems to double their bandwidth.
  • modem V.xx standards - The V Series Recommendations from the ITU-TS are summarized in the table below.
  • Modes of Attack - Test yourself.
  • modification detection code - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • modular - A module is a separate unit of software or hardware.
  • modular datacenter - Sun Microsystems' Modular Datacenter (known as "Project Blackbox" in the prototype phase) is a mobile and virtualized data center packaged in a standard 20-foot shipping container.
  • modular PC - A modular PC is a computer that has individually-housed components, which are interconnected but separately removable for service or upgrading.
  • modular programming - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
  • modular smartphone - A modular smartphone is a cellphone that can be upgraded through the attachment or replacement of discrete components.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close