Browse Definitions :

Browse Definitions by Alphabet

MIN - MOB

  • mind-brain identity theory - Mind-brain identity theory is a philosophy that purports the mind and brain are the same.
  • mindfulness training - Mindfulness training is the teaching or learning of practices designed to help participants increase their ability to live fully in the present moment.
  • mindshare (share of mind) - Mindshare, also known as share of mind, is an approach to marketing that involves attempting to make a company, brand or product the first one that comes to mind when a customer thinks of a particular market.
  • MindSphere - MindSphere is a cloud-based platform as a service (PaaS) OS for IoT devices in industrial and manufacturing sectors.
  • mini botnet - A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company.
  • Mini-ITX - Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices.
  • minicomputer - A minicomputer, a term no longer much used, is a computer of a size intermediate between a microcomputer and a mainframe.
  • minify - Code minification (to minify) is the removal of unnecessary characters from programming code.
  • minimum marketable feature (MMF) - A minimum marketable feature (MMF) is the smallest set of functionality in a product that must be provided for a customer to recognize any value.
  • minimum viable product (MVP) - Minimum viable product (MVP) is a concept for making a product that fills the perceived needs of a customer or solves a problem adequately enough to expect a sustainable business around it.
  • Mininet - Mininet is a software emulator for prototyping a large network on a single machine.
  • MinWin - MinWin is the lowest level of the Windows operating system.
  • mipmap - A MIP map (sometimes spelled mipmap) is a computer graphics technique used to achieve an illusion of depth in a two-dimensional representation of a three-dimensional (3D) image.
  • MIPS - The number of MIPS (million instructions per second) is a general measure of computing performance and, by implication, the amount of work a larger computer can do.
  • MIPS (million instructions per second) - The number of MIPS (million instructions per second) is a general measure of computing performance and, by implication, the amount of work a larger computer can do.
  • MIPv6 - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • Mira - Smart Display is a wireless touch screen display device in development at Microsoft.
  • mirror driver - A mirror driver is a Windows device driver used in extended desktops, remote desktop software and assistive technology.
  • Mirror Mode (VMware Mirror Mode) - Mirror Mode is a virtual machine backup feature for VMware vSphere 5.
  • mirror site - A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place.
  • mirror site - A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place.
  • mirroring - A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place.
  • MIS - MIS, or management information systems, is the software and hardware to support critical business applications.
  • MIS (management information systems) - MIS, or management information systems, is the software and hardware to support critical business applications.
  • Miscellaneous IT Quizzes - This is where we keep the fun! We've gathered a collection of our miscellaneous quizzes.
  • Misfortune Cookie - Misfortune Cookie is a firmware vulnerability in some routers that makes it possible for an attacker to gain administrative privileges and attack the devices and, through them, the network.
  • MISO - MISO (multiple input, single output) is an antenna technology for wireless communications in which multiple antennas are used at the source (transmitter).
  • MISO (multiple input, single output) - MISO (multiple input, single output) is an antenna technology for wireless communications in which multiple antennas are used at the source (transmitter).
  • mission mode project - A mission mode project (MMP) is an individual project within the National e-Governance Plan (NeGP) that focuses on one aspect of electronic governance, like banking, land records or commercial taxes.
  • mission mode project (MMP) - A mission mode project (MMP) is an individual project within the National e-Governance Plan (NeGP) that focuses on one aspect of electronic governance, like banking, land records or commercial taxes.
  • mission statement - A mission statement is a communication of an organization’s purpose, usually expressed with public relations (PR) or marketing in mind.
  • mission-critical application - A mission-critical application is a software program or service that must function for the success of a business or segment of a business.
  • mission-driven brand - A mission-driven brand is an organization with a clearly-stated purpose and a dedication to acting in accordance with its stated principles.
  • MIT License - The MIT License (also known as the X11 license or MITX license) is a software license that was originally developed at the Massachusetts Institute of Technology.
  • MIT License (X11 license or MIT X license) - The MIT License (also known as the X11 license or MITX license) is a software license that was originally developed at the Massachusetts Institute of Technology.
  • MIT OCW - OpenCourseWare (OCW) is an educational initiative developed by the Massachusetts Institute of Technology (MIT) to make the core teaching materials for all MIT graduate and undergraduate classes available at no cost to Internet users around the world.
  • MIT OpenCourseWare - OpenCourseWare (OCW) is an educational initiative developed by the Massachusetts Institute of Technology (MIT) to make the core teaching materials for all MIT graduate and undergraduate classes available at no cost to Internet users around the world.
  • MIT OpenCourseWare (OCW) - OpenCourseWare (OCW) is an educational initiative developed by the Massachusetts Institute of Technology (MIT) to make the core teaching materials for all MIT graduate and undergraduate classes available at no cost to Internet users around the world.
  • MIT X license - The MIT License (also known as the X11 license or MITX license) is a software license that was originally developed at the Massachusetts Institute of Technology.
  • MitM - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • MITRE ATT&CK framework - The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and up-to-date cyberthreat information to organizations looking to strengthen their cybersecurity strategies.
  • mixed reality (hybrid reality, extended reality) - Mixed reality (MR) is a user environment in which physical reality and digital content are combined in a way that enables interaction with and among real-world and virtual objects.
  • mks system of units - The metric system is considered almost synonymous with the Standard International System of Units (SI) and is sometimes called the meter-kilogram-second (MKS or mks) system.
  • MLC - Multi-level cell flash is a type of NAND flash memory that can store more than 1 bit per cell.
  • MLC flash - Multi-level cell (MLC) flash writes two data segments to the same cell, effectively doubling the capacity of flash storage media.
  • MLE - A virtual learning environment (VLE) is a set of teaching and learning tools designed to enhance a student's learning experience by including computers and the Internet in the learning process.
  • mLife - mLife is a multi-million dollar advertising campaign sponsored by AT&T to promote their wireless products and services.
  • MLPPP - Multilink PPP is a communications protocol that enables a personal computer (PC) to use two PPP (Point-to-Point Protocol) communications ports as if they were a single port of greater bandwidth.
  • MMC - The Microsoft Management Console (MMC) is an application that provides a graphical-user interface (GUI) and a programming framework in which consoles (collections of administrative tools) can be created, saved, and opened.
  • MMC - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • MMC - A MultiMediaCard (MMC) is a tiny memory card that uses flash memory to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks, PDAs, smartphones, and digital cameras, music players, and video camcorders, and personal computers.
  • MMDS - Multichannel Multipoint Distribution Service (MMDS) is a broadcasting and communications service that operates in the ultra-high-frequency (UHF) portion of the radio spectrum between 2.
  • MME - A MIM or MME file is a file in the Multi-Purpose Internet Mail Extensions (MIME) format that is created by some e-mail programs, including that of America Online (AOL), to encapsulate e-mail that contains image or program attachments.
  • MMIS - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • MMP - A mission mode project (MMP) is an individual project within the National e-Governance Plan (NeGP) that focuses on one aspect of electronic governance, like banking, land records or commercial taxes.
  • MMP - Multichassis multilink PPP (MMP) is an extension of multilink PPP (MP) in which the subscriber can consist of more than one computer.
  • MMS - The Manufacturing Message Specification (MMS) is an international standard that defines the ways in which control information is transferred among intelligent devices and systems such as computers and robots.
  • MMS - Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices.
  • MMX - MMX is a Pentium microprocessor from Intel that is designed to run faster when playing multimedia applications.
  • mnemonic - In general, a mnemonic (from Greek mnemon or mindful; pronounced neh-MAHN-ik) is a memory aid, such as an abbreviation, rhyme or mental image that helps to remember something.
  • MNP - Mobile number portability (MNP) is a service that allows a cellphone or smartphone customer to change service providers and keep the same phone number.
  • MO - The magneto-optical (MO) drive is a popular way to back up files on a personal computer.
  • MO drive - The magneto-optical (MO) drive is a popular way to back up files on a personal computer.
  • MO-297 - MO-297 is a JEDEC standard that defines the layout, connector positions and physical dimensions for a 54mm x 39mm solid state drive (SSD) with a Serial Advanced Technology Attachment (SATA) connector.
  • mob mentality (herd/hive mentality) - Mob mentality -- also called herd or hive mentality -- is the inclination that some humans have to be part of a large group, often neglecting their individual feelings in the process, and adopting the behaviors and actions of the people around them.
  • mob programming - Mob programming is a software development technique where software development teams work on the same tasks at the same time.
  • mobbing - A flash mob is a group of strangers who organize themselves, using electronic media such as cell phones or the Internet, to gather together in a public place, behave in a predetermined (and often silly) manner for a predetermined amount of time, and then quickly disperse.
  • Mobile Active Defense - Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).
  • Mobile Active Defense (MAD) - Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).
  • mobile app - A mobile app is a software application designed for use on mobile devices, such as smartphones and tablets, rather than desktop or laptop computers.
  • mobile app reputation - Mobile app reputation is an assessment of the security and privacy of an app, typically expressed as a numerical rating.
  • mobile app security - Mobile app security is the extent of protection that mobile device application programs (apps) have from malware and the activities of crackers and other criminals.
  • mobile application development - Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.
  • mobile application development platform (MADP) - A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and perhaps deploy mobile apps for smartphones and tablets.
  • Mobile Application Management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile application manager (MAM) - A mobile application manager is a tool used by network administrators to remotely install, update, remove, audit, and monitor programs installed on smartphones and tablets.
  • mobile application processor - A mobile application processor is a system on a chip (SoC) designed to support applications running in a mobile operating system environment such as Android, Apple iOS, Windows CE/Mobile or Symbian.
  • mobile application vetting - Mobile application vetting is a process that app developers take to verify the compliance of mobile applications with a specified security requirement or standard.
  • mobile authentication - Mobile authentication is the verification of a user’s identity through the use a mobile device and one or more authentication methods for secure access.
  • mobile backend as a service (mobile BaaS) - Mobile backend as a service is a cloud computing architecture that provides mobile applications with the resources they need to run.
  • mobile blog - A moblog (mobile blog) is a blog that is maintained by using a mobile device such as a PDA (personal digital assistant) or cell phone.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile business intelligence - Mobile business intelligence is an extension of business intelligence (BI) from desktops and laptops to mobile devices such as Blackberry, iPhone, and iPad.
  • mobile card reader - A mobile card reader, such as Square or PayPal Here, allows the user to accept payments through their mobile devices.
  • mobile cloud - The mobile cloud is Internet-based data, applications and related services accessed through smartphones, laptop computers, tablets and other portable devices.
  • mobile cloud applications - A mobile cloud application is a software program that is designed to be accessed over the Internet by many types of portable computing devices.
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • mobile commerce - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • mobile computing - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • mobile computing (nomadic computing) - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • mobile content management - Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices.
  • mobile CRM (mobile customer relationship management) - Mobile CRM (mobile customer relationship management) enables remote employees to access customer data and customer accounts wherever they are.
  • mobile data - Mobile data is Internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection rather than Wi-Fi or a wired connection.
  • mobile deep linking - Mobile deep linking makes it easier for people to access resources on smartphones, tablets and other mobile devices because it decreases the number of actions they have to take to get to their target destination.
  • mobile desktop virtualization - Mobile desktop virtualization is the delivery of a virtual machine (VM) image that runs business applications to a tablet or smartphone.
  • mobile device - A mobile device is essentially a handheld computer.
  • mobile device attack - A mobile device attack is an exploit targeting handheld communications devices, such as smartphones and tablets.
  • mobile device fragmentation - Mobile device fragmentation is a phenomenon that occurs when some mobile users are running older versions of an operating system, while other users are running newer versions.
  • mobile device management - Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
  • mobile device management (MDM) - Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close