Browse Definitions :

Browse Definitions by Alphabet

MAI - MAR

  • mainframe (big iron) - A mainframe (also known as 'big iron') is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer.
  • maintain and operate the organization systems and equipment - IT MOOSEmanagement is a term invented by Forrester Research for talking about the non-discretionary expenses that are required to keep an IT department running.
  • Maintenance Management Information System - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • Maintenance Management Information System (MMIS) - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • Major IT players: How'd they start out? - Think you're a Know-IT-All when it comes to influential people in IT? Test your knowledge and see if you know what these famous geeks were doing before they made it in the big leagues.
  • Majordomo - Like listserv, Majordomo (from Latin: "master of the house") is a small program that automatically redistributes e-mail to names on a mailing list.
  • make - Make is the oldest and best known build tool, a utility that allows a programmer to build or rebuild source code files into a new version of a program.
  • Make Whatis.com your home page - Directions for how to make WhatIs.
  • makefile - A makefile is used with the UNIX make utility to determine which portions of a program to compile.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • makerspace - A makerspace is a community center that provides technology, manufacturing equipment and educational opportunities to the public.
  • male connector - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malicious ad - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malicious advertisment - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • Malicious Computer Code: Glossary - This is a glossary of terms related to malicious computer code.
  • malicious software - Malware is software that is harmful to users or their computing systems.
  • malvertisement - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malvertisement (malicious advertisement or malvertising) - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malvertising - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malvertizement - A malvertizement is malicious coding served through an ad on a Web site or in an email message.
  • malware - Malware is software that is harmful to users or their computing systems.
  • malware (malicious software) - Malware, or malicious software, is any program or file that is harmful to a computer user.
  • malware testing - Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications.
  • malware throttling - Throttled data transfer, also known as data transfer throttling or lean data transfer, is the deliberate regulation of the data transfer rate in a communications system.
  • Malware: Glossary - This is a glossary of terms related to malware.
  • Malwarebytes software - Malwarebytes is a cross-platform anti-malware program that detects and removes malware and other rogue software.
  • Mammoth - Mammoth is a magnetic tape and drive system used for computer data storage and archiving.
  • MAN - A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • man in the browser - Man in the browser refers to an emerging tactic used by hackers to commit financial fraud.
  • man in the middle - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • man in the middle attack - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • man page - A man page in a Linux or other Unix-based operating system is an online description of an interactive shell command or other system interface or object.
  • man-in-the-disk (MITD) attack - Man-in-the-disk (MITD) is an attack vector that allows an intruder to intercept and potentially alter data as it moves between Android external storage and an installed app.
  • man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • managed bean - In the Java programming language, an MBean (managed bean) is a Java object that represents a manageable resource, such as an application, a service, a component, or a device.
  • managed file transfer - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed learning environment - A virtual learning environment (VLE) is a set of teaching and learning tools designed to enhance a student's learning experience by including computers and the Internet in the learning process.
  • managed mobility services (MMS) - Managed mobility services (MMS) is the procurement, deployment and management of mobile devices and apps, PC software and services connecting out-of-office workers to the enterprise environment.
  • managed network security services - Managed network security services are third-party service providers, solution providers or value-added resellers that can be hired to outsource tasks or processes related to network security.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed print services (MPS) - Managed print services (MPS) is the provision and oversight of business document output needs by an external service provider.
  • managed security service provider - A managed security service provider (MSSP) is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management, which may include virus and spam blocking, intrusion detection, firewalls and virtual private network (VPN) management.
  • Managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management, which may include virus and spam blocking, intrusion detection, firewalls and virtual private network (VPN) management.
  • managed security services - Managed security services (MSS) is a systematic approach to managing an organization's security needs.
  • managed security services (MSS) - Managed security services (MSS) is a systematic approach to managing an organization's security needs.
  • managed service provider - A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
  • managed service provider (MSP) - A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
  • managed service provider platform - A managed service provider (MSP) platform is a computing framework used to deliver network-based services, applications, and equipment to enterprises, residences, or other service providers.
  • managed storage - Managed storage is the process of offloading an organization’s data storage requirements to an outside managed service provider.
  • Management and Operations (M&O) Stamp of Approval - The Management and Operations (M&O) Stamp of Approval from the Uptime Institute is a certification of the critical facilities and management operations procedures of a data center.
  • management by objective (MBO) - Management by objective (MBO) is a model in which employees and their managers collaboratively develop, define and explicitly agree to objectives.
  • management information base - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • management information systems - MIS, or management information systems, is the software and hardware to support critical business applications.
  • management service provider (MSP) - Also see two related terms, application service provider and storage service provider.
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • manipulative design - Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.
  • Mantle - Mantle is a low-level 3D graphics application programming interface (API) created by AMD for their graphics processing units (GPUs) based on the Graphics Core Next (GCN) architecture.
  • mantrap - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • mantrap (interlocking door controller) - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • manual restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • manufactured sapphire - Manufactured sapphire is synthetic crystalline aluminum oxide that is transparent like glass, but harder.
  • manufacturer's suggested retail price (MSRP) - Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores.
  • Manufacturing 2.0 - Manufacturing 2.
  • Manufacturing details (quiz) - Test yourself.
  • manufacturing execution system - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • manufacturing intelligence software - Enterprise manufacturing intelligence software is a suite of software applications that integrates a company's manufacturing data from multiple sources to aid in reporting, analysis, visual summaries and passing data between enterprise-level and plant-floor systems.
  • Manufacturing Message Specification - The Manufacturing Message Specification (MMS) is an international standard that defines the ways in which control information is transferred among intelligent devices and systems such as computers and robots.
  • Manufacturing Message Specification (MMS) - The Manufacturing Message Specification (MMS) is an international standard that defines the ways in which control information is transferred among intelligent devices and systems such as computers and robots.
  • Manufacturing operation management - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • Manufacturing operation management (MOM) - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • manufacturing process management (MPM) - Manufacturing process management (MPM) is the discipline of defining how products are manufactured so production processes can be made more efficient and responsive.
  • Manufacturing resource planning (MRP II) - Manufacturing resource planning (MRP II) is an integrated method of operational and financial planning for manufacturing companies.
  • MAPI - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI over HTTP (Messaging Application Programming Interface over HTTP) - MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.
  • mapping service - Online mapping is the compilation and publication of Web sites that provide exhaustive graphical and text information in the form of maps and databases.
  • MapR - MapR Technologies is a distributed data platform for AI and analytics provider that enables enterprises to apply data modeling to their business processes with the goal of increasing revenue, reducing costs and mitigating risks.
  • MapReduce - MapReduce is a core component of the Apache Hadoop software framework.
  • maps - Get a map of your (or someone else's) town, neighborhood, or street.
  • Mapuccino - Mapuccino is a Java applet or small program that can show a visual map of how a Web site is organized.
  • marchitecture - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.
  • marcom - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • marcomm - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • margin of safety (MoS) - In statistics, the margin of error is a measure of the random variation in a survey's results.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • Marimba - Marimba is a company that has introduced a somewhat new way of using the World Wide Web.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market culture - A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close