Browse Definitions :

Browse Definitions by Alphabet

MAI - MAR

  • Maintenance Management Information System (MMIS) - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • Majordomo - Like listserv, Majordomo (from Latin: "master of the house") is a small program that automatically redistributes e-mail to names on a mailing list.
  • make - Make is the oldest and best known build tool, a utility that allows a programmer to build or rebuild source code files into a new version of a program.
  • makefile - A makefile is used with the UNIX make utility to determine which portions of a program to compile.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • makerspace - A makerspace is a community center that provides technology, manufacturing equipment and educational opportunities to the public.
  • male connector - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malicious ad - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malicious advertisment - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • Malicious Computer Code: Glossary - This is a glossary of terms related to malicious computer code.
  • malicious software - Malware is software that is harmful to users or their computing systems.
  • malvertisement - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malvertisement (malicious advertisement or malvertising) - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malvertising - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malware - Malware is software that is harmful to users or their computing systems.
  • malware (malicious software) - Malware, or malicious software, is any program or file that is harmful to a computer user.
  • Malware Analysis Report (MAR) - Malware Analysis Report (MAR) is a document that relates the functionality and effects of a given piece of malware.
  • malware testing - Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications.
  • malware throttling - Throttled data transfer, also known as data transfer throttling or lean data transfer, is the deliberate regulation of the data transfer rate in a communications system.
  • Malware: Glossary - This is a glossary of terms related to malware.
  • Malwarebytes software - Malwarebytes is a cross-platform anti-malware program that detects and removes malware and other rogue software.
  • Mammoth - Mammoth is a magnetic tape and drive system used for computer data storage and archiving.
  • MAN - A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • man in the browser - Man in the browser refers to an emerging tactic used by hackers to commit financial fraud.
  • man in the middle - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • man in the middle attack - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • man page - A man page in a Linux or other Unix-based operating system is an online description of an interactive shell command or other system interface or object.
  • man-in-the-disk (MITD) attack - Man-in-the-disk (MITD) is an attack vector that allows an intruder to intercept and potentially alter data as it moves between Android external storage and an installed app.
  • man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • managed bean - In the Java programming language, an MBean (managed bean) is a Java object that represents a manageable resource, such as an application, a service, a component, or a device.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed file transfer - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed learning environment - A virtual learning environment (VLE) is a set of teaching and learning tools designed to enhance a student's learning experience by including computers and the Internet in the learning process.
  • managed mobility services (MMS) - Managed mobility services (MMS) is the procurement, deployment and management of mobile devices and apps, PC software and services connecting out-of-office workers to the enterprise environment.
  • managed network security services - Managed network security services are third-party service providers, solution providers or value-added resellers that can be hired to outsource tasks or processes related to network security.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed print services (MPS) - Managed print services (MPS) is the provision and oversight of business document output needs by an external service provider.
  • managed security service provider - A managed security service provider (MSSP) is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management, which may include virus and spam blocking, intrusion detection, firewalls and virtual private network (VPN) management.
  • Managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management, which may include virus and spam blocking, intrusion detection, firewalls and virtual private network (VPN) management.
  • managed security services - Managed security services (MSS) is a systematic approach to managing an organization's security needs.
  • managed security services (MSS) - Managed security services (MSS) is a systematic approach to managing an organization's security needs.
  • managed service provider - A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
  • managed service provider (MSP) - A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
  • managed service provider platform - A managed service provider (MSP) platform is a computing framework used to deliver network-based services, applications, and equipment to enterprises, residences, or other service providers.
  • managed storage - Managed storage is the process of offloading an organization’s data storage requirements to an outside managed service provider.
  • Management and Operations (M&O) Stamp of Approval - The Management and Operations (M&O) Stamp of Approval from the Uptime Institute is a certification of the critical facilities and management operations procedures of a data center.
  • management by objective (MBO) - Management by objective (MBO) is a model in which employees and their managers collaboratively develop, define and explicitly agree to objectives.
  • management information base - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • management information systems - MIS, or management information systems, is the software and hardware to support critical business applications.
  • management service provider (MSP) - Also see two related terms, application service provider and storage service provider.
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • manipulative design - Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.
  • Mantle - Mantle is a low-level 3D graphics application programming interface (API) created by AMD for their graphics processing units (GPUs) based on the Graphics Core Next (GCN) architecture.
  • mantrap - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • mantrap (interlocking door controller) - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • manual restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • manufactured sapphire - Manufactured sapphire is synthetic crystalline aluminum oxide that is transparent like glass, but harder.
  • manufacturer's suggested retail price (MSRP) - Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores.
  • Manufacturing 2.0 - Manufacturing 2.
  • Manufacturing details (quiz) - Test yourself.
  • manufacturing execution system - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • manufacturing intelligence software - Enterprise manufacturing intelligence software is a suite of software applications that integrates a company's manufacturing data from multiple sources to aid in reporting, analysis, visual summaries and passing data between enterprise-level and plant-floor systems.
  • Manufacturing Message Specification - The Manufacturing Message Specification (MMS) is an international standard that defines the ways in which control information is transferred among intelligent devices and systems such as computers and robots.
  • Manufacturing Message Specification (MMS) - The Manufacturing Message Specification (MMS) is an international standard that defines the ways in which control information is transferred among intelligent devices and systems such as computers and robots.
  • Manufacturing operation management - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • Manufacturing operation management (MOM) - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • manufacturing process management (MPM) - Manufacturing process management (MPM) is the discipline of defining how products are manufactured so production processes can be made more efficient and responsive.
  • Manufacturing resource planning (MRP II) - Manufacturing resource planning (MRP II) is an integrated method of operational and financial planning for manufacturing companies.
  • MAPI - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI over HTTP (Messaging Application Programming Interface over HTTP) - MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.
  • mapping service - Online mapping is the compilation and publication of Web sites that provide exhaustive graphical and text information in the form of maps and databases.
  • MapR - MapR Technologies is a distributed data platform for AI and analytics provider that enables enterprises to apply data modeling to their business processes with the goal of increasing revenue, reducing costs and mitigating risks.
  • MapReduce - MapReduce is a core component of the Apache Hadoop software framework.
  • marchitecture - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.
  • marcom - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • marcomm - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • margin of safety (MoS) - In statistics, the margin of error is a measure of the random variation in a survey's results.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • Marimba - Marimba is a company that has introduced a somewhat new way of using the World Wide Web.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market culture - A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees.
  • market development funds (MDF) - Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.
  • market distortion - Market distortion is the lack of free and open competition in a market, whether through intentional actions or prevailing market conditions.
  • market intelligence (MI) - Market intelligence is the monitoring of specific data streams in order to provide stakeholders with a holistic view of an industry segment or customer base.
  • market intelligence manager - A market intelligence manager is a corporate employee who studies a given market, makes recommendations as to actions to capitalize on opportunities and helps direct strategy to assist the company in reaching its revenue targets.
  • market leadership - Market leadership is when an individual or company owns the largest market share or highest profitability margin in a given market for goods and services.
  • market segmentation - Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share into smaller groups.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close