Browse Definitions :

Browse Definitions by Alphabet

MOB - MUL

  • mobile hotspot - A mobile hotspot is an ad hoc wireless access point that is created by a dedicated hardware device or a smartphone feature that shares the phone's cellular data.
  • mobile information management (MIM) - Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.
  • mobile Internet device (MID) - The mobile Internet device (MID) is a mini-tablet communications unit aimed at the consumer market and designed to provide entertainment, information and location-based services.
  • Mobile IP - Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address.
  • Mobile IPv6 (MIPv6 or Mobile Internet Protocol version 6) - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • mobile IT (mobile information technology) - Mobile IT (mobile information technology) is the ability of IT departments to deliver enterprise information technology solutions to employees working anywhere on any device.
  • mobile malware - Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.
  • mobile marketing - Mobile marketing is promotional activity designed for delivery to cell phones, smart phones and other handheld devices, usually as a component of a multi-channel campaign.
  • mobile middleware - Mobile middleware is software that connects disparate mobile applications, programs and systems.
  • mobile number portability (MNP) - Mobile number portability (MNP) is a service that allows a cellphone or smartphone customer to change service providers and keep the same phone number.
  • mobile number privacy - Mobile number privacy is the protection of the phone user’s number from unwanted access.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile payment (m-payment) - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile platform as a service (mPaaS) - Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile productivity app (mobile productivity application) - A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks.
  • mobile robot (mobile robotics) - A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
  • mobile search - Mobile search is the practice of querying a search engine from an Internet-connected handheld device, such as a smart phone.
  • mobile security (wireless security) - Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • mobile security certification - A mobile security certification is a formalized program that verifies the participant’s competency in tasks related to mobile security and administration.
  • mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • mobile spyware - Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile ticketing - Mobile ticketing is the purchase of admission to events through a mobile device, including the delivery of digital tickets to a smartphone for use in place of traditional paper tickets.
  • mobile UI (mobile user interface) - A mobile UI is the user interface on a mobile device, usually including a touch screen display and all the other elements of the device that allow the user to interact with it.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a services provider in the mobile device industry that provides wireless communications services including voice and data to customers over a wireless network infrastructure owned by a third-party mobile network operator (MNO).
  • mobile virtualization - Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • mobile workstation - A mobile workstation is a notebook computer with high-end computing features not typical of the notebook.
  • mobile-to-mobile convergence (MMC) - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • MobileIron - MobileIron is a company that provides management and security software for mobile apps, content and devices.
  • mobo (motherboard) - Mobo is a short form for motherboard that is sometimes used in Usenet newsgroups and Web forum discussions.
  • mock object - In object-oriented programming, a mock object is a simulated object that mimics the behavior of the smallest testable parts of an application in controlled ways.
  • model of reflection - A model of reflection is a structured process that is used to guide personal and situational analysis and improvement.
  • model-based enterprise - Model-based enterprise (MBE) is an engineering strategy that aims to clarify design intent during the manufacturing process, resulting in better quality of the products, reduced costs and more efficiency.
  • model-based testing - Model-based testing (MBT) requires a test team to create a second, lightweight implementation of a software build- typically only the business logic - called the model.
  • model-driven development (MDD) - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model-view-controller (MVC) - In object-oriented programming development, model-view-controller (MVC) is the name of a methodology or design pattern for successfully and efficiently relating the user interface to underlying data models.
  • Model-View-ViewModel (MVVM) - Model-View-ViewModel (MVVM) is a software design pattern that is structured to separate program logic and user interface controls.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • ModelOps (model operations) - ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
  • modem - A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
  • modem error-correcting protocols - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • modular PC - A modular PC is a computer that has individually-housed components, which are interconnected but separately removable for service or upgrading.
  • modulation - Modulation is the process of converting data into radio waves by adding information to an electronic or optical carrier signal.
  • module - A module is a distinct assembly of components that can be easily added, removed or replaced in a larger system.
  • moire effect - Moire effect is a visual perception that occurs when viewing a set of lines or dots that is superimposed on another set of lines or dots, where the sets differ in relative size, angle, or spacing.
  • mole per meter cubed (Avogadro constant) - The mole per meter cubed (mol / m 3) is the International Unit of amount-of-substance concentration.
  • molecular manufacturing - Molecular manufacturing is a branch of nanotechnology that involves the use of nanoscale (extremely small) tools and non-biological processes to build structures, devices, and systems at the molecular level.
  • molecule - A molecule is two or more atoms connected by chemical bonds, which form the smallest unit of a substance that retains the composition and properties of that substance.
  • moment of truth (marketing MOT) - A moment of truth is marketing lingo for any opportunity a customer (or potential customer) has to form an impression about a company, brand, product or service.
  • Monad Manifesto - The Monad Manifesto is a document written by Jeffrey Snover in 2002 that outlined his idea for a new Windows systems administration tool named Monad, which was changed to Windows PowerShell.
  • money laundering - Money laundering is the act of disguising the original ownership, identity and destination of the profits of a crime by hiding it within a legitimate financial institution and making it appear to have been acquired from a legal source.
  • MongoDB - MongoDB is an open source NoSQL database management program.
  • moniker - In general, a moniker is a name or a nickname and, in the simplest terms, that is what it is in computer terminology as well.
  • monolithic - Monolithic, in information technology, means either very large or composed all in one piece, depending on the particular context.
  • monolithic architecture - A monolithic architecture is the traditional unified model for the design of a software program.
  • monostable circuit - A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).
  • monotasking (single-tasking) - Monotasking, also known as single-tasking, is the practice of dedicating oneself to a given task and minimizing potential interruptions until the task is completed or a significant period of time has elapsed.
  • monotonicity - Monotonicity is a property of certain types of digital-to-analog converter (DAC) circuits.
  • Monster Worldwide - Monster Worldwide is an online recruiting company noted for its flagship Monster.
  • monthly recurring revenue (MRR) - Monthly recurring revenue (MRR) is income a company can reliably anticipate every 30 days and one of the key metrics for channel partner companies.
  • moonshot - In technology, a moonshot is an ambitious, exploratory and groundbreaking project undertaken without the assurance of near-term profitability or benefit and, perhaps, without a full investigation of potential risks and benefits.
  • Morphis - Morphis is a Java -based open source wireless transcoding platform from Kargo, Inc.
  • morphological analysis - Morphological analysis is the process of examining possible resolutions to unquantifiable, complex problems involving many factors.
  • Morse code - Morse code is a method of sending text messages by keying in a series of electronic pulses, usually represented as a short pulse (called a "dot") and a long pulse (a "dash").
  • MoSCoW method - The MoSCoW method is a four-step approach to prioritizing which project requirements will provide the best return on investment (ROI).
  • most significant bit (MSB) - The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.
  • motherboard - A motherboard is the main printed circuit board (PCB) in a computer.
  • motherboard tattoo - A motherboard tattoo is a colloquial term once used to denote an ID code that is written in the basic input/output system (BIOS) of a computer to uniquely identify the computer.
  • motion analysis - Motion analysis is a measuring technique used in computer vision, image processing and high-speed photography applications to detect movement.
  • motion capture (mo-cap) - Motion capture (mo-cap) is the use of sensors on real bodies (objects and beings) to track motion and record the movements digitally, typically for transferring to virtual 3D imaging.
  • motion gaming (motion-controlled gaming) - A motion gaming system, sometimes called a motion-controlled gaming system, is one that allows players to interact with the system through body movements.
  • motive power - Motive power is a term in thermodynamics referring to the harnessed energy or force that is used to power a mechanical device or system.
  • motor vehicle record (MVR) - A motor vehicle record (MVR) is the documentation of a person’s driving history.
  • mount - In computers, to mount is to make a group of files in a file system structure accessible to a user or user group.
  • mount point - Whether it comes from a partition on the same drive, a new hard drive, media inserted into an optical drive or some form of flash memory, any file system must be mounted before it can be displayed and its file system read.
  • mouse - A mouse is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
  • moves, adds and changes (MAC) - Moves, adds and changes (MAC) keep computing equipment in line with user needs and up-to-date, with disciplined process management.
  • Mozilla - Mozilla was Netscape Communication's nickname for Navigator, its first Web browser, and the name of an open source public collaboration created to develop Navigator.
  • Mozy (by Dell) - Mozy (by Dell) was a cloud backup service owned by Dell EMC that targeted customers ranging from consumers through to the enterprise.
  • MP3 (MPEG-1 Audio Layer-3) - MP3 (MPEG-1 Audio Layer-3) is a standard technology and format for a sound sequence into a very small file (about one-twelfth the size of the original file) while preserving the original level of sound quality when it is played.
  • MPEG standards (Moving Picture Experts Group) - The MPEG standards are an evolving set of standards for video and audio compression and for multimedia delivery developed by the Moving Picture Experts Group (MPEG).
  • MphasiS - MphasiS is an IT services company headquartered in Bengaluru, India.
  • MPLS-TP (MPLS Transport Profile) - The Multiprotocol Label Switching Transport Profile (MPLS-TP) is a protocol extension of MPLS designed to speed up and shape network traffic in operator transport networks.
  • mPOS (mobile point of sale) - An mPOS (mobile point-of-sale) is a smartphone, tablet or dedicated wireless device that performs the functions of a cash register or electronic point-of-sale terminal (POS terminal) wirelessly.
  • MPP (massively parallel processing) - MPP (massively parallel processing) is the coordinated processing of a program by multiple processors that work on different parts of the program, with each processor using its own operating system and memory.
  • MPP database (massively parallel processing database) - An MPP database is a database that is optimized to be processed in parallel for many operations to be performed by many processing units at a time.
  • MQSeries - MQSeries is an IBM software family whose components are used to tie together other software applications so that they can work together.
  • MQTT (MQ Telemetry Transport) - MQTT (MQ Telemetry Transport) is a lightweight open messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information in low-bandwidth environments.
  • MRAM (magnetoresistive random access memory) - MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical charges used by devices such as dynamic random access memory (DRAM).
  • MS-DOS (Microsoft Disk Operating System) - MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers.
  • mSATA SSD (mSATA solid-state drive) - An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) International Organization.
  • MSP platform (managed service provider platform) - A managed service provider (MSP) platform is a computing framework used to deliver network-based services, applications, and equipment to enterprises, residences, or other service providers.
  • MTBF (mean time between failures) - MTBF (mean time between failures) is a measure of how reliable a hardware product or component is.
  • MTTR (mean time to repair) - MTTR (mean time to repair) is the average time required to fix a failed component or device and return it to production status.
  • mu - The lowercase Greek letter µ (pronounced mu) generally represents the prefix multiplier 0.
  • MUD (Multi-User Dungeon) - A MUD or Multi-User Dungeon is an inventively structured social experience on the Internet, managed by a computer program and often involving a loosely organized context or theme, such as a rambling old castle with many rooms or a period in national history.
  • Muda, Mura and Muri - Muda, mura and muri are three types of wasteful actions that negatively impact workflow, productivity and ultimately, customer satisfaction.
  • MuleSoft - MuleSoft is an integration platform provider that connects SaaS and legacy applications both on-premises and in the cloud with its Anypoint Platform.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close