Browse Definitions :
12,826 results for:

Information Kit: Grid Computing

Definition | WhatIs.com

Grid computing (or the use of a computational grid) is applying the resources of many computers in a network to a single problem at the same time

Generic Access Network (GAN)

Definition | SearchMobileComputing

The Generic Access Network (GAN) is an evolving wireless communications system in which mobile phone sets function seamlessly between local area ...

WAX (Wireless Abstract XML)

Definition | SearchMobileComputing

Wireless Abstract XML (WAX) is an abstract markup language and associated tools that facilitate wireless application development.

LTE (Long Term Evolution)

Definition | SearchMobileComputing

Long Term Evolution (LTE) is a standard for 4G wireless broadband technology that offers increased network capacity and speed to mobile device users.

chucking

Definition | SearchMobileComputing

In computer and telephone use, chucking is the process of discarding a small piece of hardware by violent means, such as hurling it out a window, ...

Microsoft System Center Mobile Device Manager (MSCMDM)

Definition | SearchMobileComputing

Microsoft System Center Mobile Device Manager (MSCMDM) is server-based software that allows enterprise IT professionals to manage and automate tasks ...

EV-DO (1x Evolution-Data Optimized)

Definition | SearchMobileComputing

1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard. (...Continued)

mobile VPN (mobile virtual private network)

Definition | SearchMobileComputing

A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a ...

wireless backhaul

Definition | SearchMobileComputing

Wireless backhaul is the use of wireless communications systems to get data from an end user to a node in a major network such as the Internet or the...

spectrum efficiency

Definition | SearchMobileComputing

Spectrum efficiency is the optimized use of spectrum or bandwidth so that the maximum amount of data can be transmitted with the fewest transmission ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close