Browse Definitions :
3,517 results for:

%25s

X.25

Definition | SearchNetworking

The X.25 protocol, adopted as a standard by the Consultative Committee for International Telegraph and Telephone (CCITT), is a commonly-used network ...

S corporation (S corp)

Definition | WhatIs.com

Like a C corporation, the S corp is considered a separate entity under the law. However, all of the profits and losses of an S corporation pass ...

MphasiS

Definition | WhatIs.com

MphasiS is an IT services company headquartered in Bengaluru, India.

SaaS

Definition | WhatIs.com

SaaS stands for at least three different "as-a-service" offerings.

S/390

Definition | SearchDataCenter

S/390 is IBM's large server (or mainframe) line of computer systems, which are marketed to the world's Fortune 1000 and many mid-size companies as a ...

FaaS (Framework as a Service)

Definition | SearchCloudApplications

FaaS (framework as a service) is a service offering that falls somewhere between SaaS (software as a service) and PaaS (platform as a service).

PL/S

Definition | WhatIs.com

PL/S is a language that IBM designed for use in developing system programs, especially in mainframe operating systems and application subsystems.

second (s or sec)

Definition | WhatIs.com

The second (abbreviation,s or sec) is the Standard International (SI) unit of time.

SAP S/4HANA Cloud

Definition | SearchSAP

SAP S/4HANA Cloud is a SaaS version of SAP S/4HANA ERP, a suite of integrated business applications.

S interface

Definition | SearchNetworking

In Integrated Services Digital Network (ISDN) service, an S interface is the electrical interface between a network terminating unit 1 (NT and up to ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close