Browse Definitions :

Browse Definitions by Alphabet

OPE - OPL

  • Open Graphics Library - OpenGL (Open Graphics Library) is the computer industry's standard application program interface (API) for defining 2-D and 3-D graphic images.
  • Open Grid Services Architecture - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • Open Grid Services Architecture (OGSA) - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • Open Handset Alliance - The Open Handset Alliance (OHA) is a coalition of more than 30 technology and mobile companies that introduced Android, an open source mobile phone operating system.
  • Open Handset Alliance (OHA) - The Open Handset Alliance (OHA) is a coalition of more than 30 technology and mobile companies that introduced Android, an open source mobile phone operating system.
  • open hardware - Open source hardware, also called open hardware, is electronic or computer hardware built from design information that could be copyrighted or licensed but has instead been made available for public use at no charge.
  • open id - OpenID is an open specification for authentication and single sign-on.
  • Open Internet Order of 2010 - The Open Internet Order of 2010 is a set of rules proposed by the United States Federal Communications Commission (FCC) with the purpose of maintaining an open and neutral internet that supports free speech and generally treats all traffic as equal.
  • open loop / closed loop payment cards - Open loop and closed loop, in the context of payment cards, are categories that stipulate whether a card can be used in businesses other than that of the card issuer.
  • Open Multimedia Application Platform - Open Multimedia Application Platform (OMAP) is the name of Texas Instrument’s application processor.
  • Open Multimedia Application Platform (OMAP) - Open Multimedia Application Platform (OMAP) is the name of Texas Instrument’s application processor.
  • Open Network Automation Platform - The Open Network Automation Platform (ONAP) is a networking project that provides a digital environment for the orchestration and automation of complex network services.
  • open networking - Open networking describes a network that uses open standards and commodity hardware.
  • Open Platform Communications (OPC) - Open Platform Communications (OPC) is an interoperability standard for the secure exchange of industrial automation data.
  • Open Plugable Specification (OPS) - Open Pluggable Specification (OPS) is a set of parameters for standardizing modules that add compute ability to screen readers.
  • Open Rack - The Open Rack specification is an open standard for server racks designed to integrate with other parts of Facebook's Open Compute Project (OCP).
  • open redirect - Open redirect is a security flaw in an app or a web page that causes it to fail to properly authenticate URLs.
  • open security - Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.
  • Open Service Gateway Initiative - OSGi (Open Service Gateway Initiative) is an industry plan for a standard way to connect devices such as home appliances and security systems to the Internet.
  • Open Service Gateway Initiative - OSGi (Open Service Gateway Initiative) is Java framework for developing and deploying modular software programs and libraries.
  • Open Service Gateway Initiative (OSGi) - OSGi (Open Service Gateway Initiative) is an industry plan for a standard way to connect devices such as home appliances and security systems to the Internet.
  • Open Settlement Protocol (OSP) - Open Settlement Protocol (OSP) is a client-server protocol that manages access control, accounting, usage data and inter-domain routing to make it easier for Internet service providers to support IP telephony.
  • Open Shortest Path First - The OSPF router protocol is used to find the best path for packets as they pass through a set of connected networks.
  • Open Shortest Path First protocol - The OSPF router protocol is used to find the best path for packets as they pass through a set of connected networks.
  • open source - The term 'open source' refers to any program whose source code is made available for use or modification as users or other developers see fit.
  • open source business intelligence - Open source business intelligence (BI) is, technically, free BI.
  • open source business intelligence (OSBI) - Open source business intelligence (BI) is, technically, free BI.
  • open source ERP - Open source ERP refers to an enterprise resource planning (ERP) software model in which the public has access to the source code of the system.
  • Open Source Hardening Project - The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code.
  • open source hardware - Open source hardware, also called open hardware, is electronic or computer hardware built from design information that could be copyrighted or licensed but has instead been made available for public use at no charge.
  • open source hardware (open hardware) - Open source hardware, also called open hardware, is electronic or computer hardware built from design information that could be copyrighted or licensed but has instead been made available for public use at no charge.
  • open source software - Free and open source software (FOSS), also known as free/libre open source software (FLOSS) and free/open source software (F/OSS), is software developed by informal collaborative networks of programmers and end users.
  • open source storage - Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution and modification of the source code.
  • open system - In a computing context, an open system is an open source operating system, typically composed of coordinated modular components from a number of sources and not reliant upon any proprietary elements.
  • Open System Authentication - Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Open System Authentication (OSA) - Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Open Systems Interconnection - OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • open test standard - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • Open Vault - Open Vault is an open-source storage specification created by Facebook and the Open Compute Project (OCP).
  • open virtualization format (OVF) - Open Virtualization Format (OVF) is an open-source standard for packaging and distributing software and applications for virtual machines (VM).
  • Open Web Application Security Project - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • Open Web Application Security Project Top Ten - The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.
  • open-source - In general, open source refers to any program whose source code is made available for use or modification as users or other developers see fit.
  • OpenAI - OpenAI is a non-profit research company that aims to develop and direct artificial intelligence (AI) in ways that benefit humanity as a whole.
  • OpenAPI Specification - The OpenAPI (OAI) Specification defines a standard, programming language-agnostic interface description for RESTful APIs.
  • OpenAppID - OpenAppID is an application-layer network security plugin for the open source intrusion detection system Snort.
  • OpenConfig - OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.
  • OpenCourseWare - OpenCourseWare (OCW) is an educational initiative developed by the Massachusetts Institute of Technology (MIT) to make the core teaching materials for all MIT graduate and undergraduate classes available at no cost to Internet users around the world.
  • OpenEMR - OpenEMR is free, open source software for the health care industry.
  • OpenFlow - OpenFlow is a protocol that allows a server to tell network switches where to send packets.
  • OpenFlow controller - An OpenFlow controller is an application that manages flow control in a software-defined networking (SDN) environment.
  • OpenFlow switch - An OpenFlow switch is a software program or hardware device that forwards packets in a software-defined networking (SDN) environment.
  • OpenGL - OpenGL (Open Graphics Library) is the computer industry's standard application program interface (API) for defining 2-D and 3-D graphic images.
  • OpenGL (Open Graphics Library) - OpenGL (Open Graphics Library) is the computer industry's standard application program interface (API) for defining 2-D and 3-D graphic images.
  • OpenID (OpenID Connect) - OpenID is an open specification for authentication and single sign-on.
  • OpenJDK - OpenJDK is a free, open-source version of the Java Development Kit for the Java Platform, Standard Edition (Java SE).
  • OpenNebula - OpenNebula is an open source management tool that helps virtualized data centers enable private clouds, public clouds and hybrid clouds.
  • OpenPGP - OpenPGP is an open and free version of the Pretty Good Privacy (PGP) standard that defines encryption formats to enable private messaging abilities for email and other message encryption.
  • OpenPower Foundation - The OpenPower Foundation is an organization in which IBM shares its Power microprocessor technology with licensed members.
  • OpenSSL - OpenSSL is a general purpose cryptography library that provides an open source implementation of the SSL and TLS protocols.
  • OpenStack - OpenStack is a collection of open source software modules and tools that provide a framework to create and manage both public cloud and private cloud infrastructure.
  • OpenStack Foundation - The OpenStack Foundation manages and oversees the development of the OpenStack open source cloud platform.
  • OpenStack Horizon - OpenStack Horizon is a web-based graphical interface that cloud administrators and users can access to manage OpenStack compute, storage and networking services.
  • OpenStack Neutron (formerly called Quantum) - OpenStack Neutron is a cloud networking controller and a networking-as-a-service project within the OpenStack cloud computing initiative.
  • OpenStack Swift - OpenStack Swift, also known as OpenStack Object Storage, is an open source object storage system that is licensed under the Apache 2.
  • OpenText ECM Suite - OpenText Enterprise Content Management (ECM) Suite is a bundled group of content management software made by Open Text Corporation, whose programs include document management, record management, email management and web content management.
  • OpenType - OpenType is a file format for scalable (outline) font files that extends the existing TrueType font file format used by Microsoft Windows and Apple Macintosh operating systems.
  • OpenView - HP OpenView is a suite of business computer management or "e-services" programs from Hewlett-Packard (HP), which states that the suite is "among the world's 20 largest software businesses.
  • OpenVMS - OpenVMS is an operating system from the Digital Equipment Corporation (DEC) that runs in both its VAX and Alpha computers.
  • Opera - Opera is a Web browser that provides some advantages over the two most popular browsers from Netscape and Microsoft.
  • operand - In computers, an operand is the part of a computer instruction that specifies data that is to be operating on or manipulated and, by extension, the data itself.
  • operating model - An operating model is a visual representation of how an organization delivers value to its internal and external customers.
  • operating system - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • operating system (OS) - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • operating system clustering - Hardware clustering (sometimes called operating system clustering) is a hardware-based method of turning multiple servers into a cluster (a group of servers that acts like a single system).
  • operating system commanding - OS commanding is a method of attacking a Web server by remotely gaining access to the operating system (OS) and then executing system commands through a browser.
  • operation - An operation, in mathematics and computer science, is an action that is carried out to accomplish a given task.
  • Operation Phish Phry - Operation Phish Phry is a cybercrime investigation carried out by the United States Federal Bureau of Investigation (FBI), the Los Angeles Electronic Crimes Task Force and Egyptian authorities.
  • operational costs - Definition - In information technology, operational costs document the price of running of IT services on a day-to-day basis.
  • operational data store - An operational data store (ODS) is a type of database that's often used as an interim logical area for a data warehouse.
  • operational data store (ODS) - An operational data store (ODS) is a type of database that's often used as an interim logical area for a data warehouse.
  • operational efficiency - Operational efficiency is the ability of an organization to reduce waste in time, effort and materials as much as possible, while still producing a high-quality service or product.
  • operational excellence - Operational excellence is a methodology of striving for efficacy throughout an organization’s processes.
  • operational expenditure - An operational expenditure (Opex) is the money a company spends on an ongoing, day-to-day basis in order to run a business or system.
  • operational intelligence (OI) - Operational intelligence (OI) is an approach to data analysis that enables decisions and actions in business operations to be based on real-time data as it's generated or collected by companies.
  • operational level agreement - An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services.
  • operational level agreement (OLA) - An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services.
  • operational performance management - Operational performance management (OPM) is the alignment of all business units within an organization to ensure that they are working together to achieve core business goals.
  • operational performance management (OPM) - Operational performance management (OPM) is the alignment of all business units within an organization to ensure that they are working together to achieve core business goals.
  • operational risk - Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business operations.
  • operational support system - An operational support system (OSS) is a set of programs that help a communications service provider monitor, control, analyze and manage a telephone or computer network.
  • operational support system (OSS) - An operational support system (OSS) is a set of programs that help a communications service provider monitor, control, analyze and manage a telephone or computer network.
  • operational technology (OT) - Operational technology (OT) is a category of hardware and software that monitors and controls how physical devices perform.
  • operations administration and management - OA&M (operations, administration, and management) is a general term used to describe the costs, tasks involved, or other aspects of operating, administering, and managing something such as a computer network.
  • operations research - Operations research (OR) is an analytical method of problem-solving and decision-making that is useful in the management of organizations.
  • operations research (OR) - Operations research (OR) is an analytical method of problem-solving and decision-making that is useful in the management of organizations.
  • operator - In mathematics, an operator is a character that represents an action, as for example x is an arithmetic operator that represents multiplication.
  • OPEX - An operational expenditure (Opex) is the money a company spends on an ongoing, day-to-day basis in order to run a business or system.
  • Opex (operational expenditure) - An operational expenditure (Opex) is the money a company spends on an ongoing, day-to-day basis in order to run a business or system.
  • OpLock (opportunistic lock) - OpLocks are made to enable simultaneous file access by multiple users while also improving performance for synchronized caches.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close