Browse Definitions :
10,153 results for:

HP Virtual Server Environment (HP VSE)

Definition | SearchServerVirtualization

The HP Virtual Server Environment (HP VSE) is a server virtualization product developed by Hewlett-Packard (HP) to optimize resource utilization in ...

Open Blueprint

Definition | SearchDataCenter

Open Blueprint is IBM's strategic view of the network computing services and the relationship between these services.

Basic Assembler Language (BAL)

Definition | SearchDataCenter

BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 ...

virtual networking

Definition | SearchServerVirtualization

Virtual networking is a technology that facilitates the control of one or more remotely located computers or servers over the Internet... (Continued)

Small Disadvantaged Business (SDB)

Definition | SearchITChannel

A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both ...

Defense Acquisition Regulatory Council (DARC)

Definition | SearchITChannel

The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency...

OEM (original equipment manufacturer)

Definition | SearchITChannel

OEM, or original equipment manufacturer, is a broad term that describes a web of relationships among IT hardware vendors, hardware component makers, ...

ActiveX control

Definition | SearchEnterpriseDesktop

An ActiveX control is a component program object that can be re-used by many application programs within a computer or among computers in a network.

VBScript

Definition | SearchEnterpriseDesktop

VBScript is an interpreted script language from Microsoft that is a subset of its Visual Basic programming language designed for interpretation by ...

Windows Remote Desktop

Definition | SearchEnterpriseDesktop

Windows Remote Desktop is a program that allows the user to connect to a computer in another location and interact with it as if it were local. (...

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Melissa virus

    Melissa was a type of email virus that initially become an issue in early 1999.

  • biometric payment

    Biometric payment is a point-of-sale (POS) technology that uses biometric authentication physical characteristics to identify the...

  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile data storage device.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

Close