Browse Definitions :
12,229 results for:

multidimensional database (MDB)

Definition | SearchOracle

A multidimensional database (MDB) is a type of database that is optimized for data warehouse and online analytical processing (OLAP) applications. ...

Internet Explorer (IE)

Definition | SearchEnterpriseDesktop

Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.

trouble ticket (trouble report)

Definition | SearchCRM

A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some ...

talking translator

Definition | SearchCRM

A talking translator is a program that translates words and phrases from one language to another language and delivers the translation to the user as...

microsegmentation

Definition | SearchCRM

Microsegmentation is a process that divides an entity into extremely small parts.

mobility agent

Definition | SearchMobileComputing

In Mobile Internet Protocol (Mobile IP), a mobility agent is a router that facilitates Internet traffic forwarding for a mobile node when its ...

mobile-to-mobile convergence (MMC)

Definition | SearchMobileComputing

Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any ...

mLife

Definition | SearchMobileComputing

mLife is a multi-million dollar advertising campaign sponsored by AT&T to promote their wireless products and services.

Hierarchical Mobile IPv6 (HMIPv6)

Definition | SearchMobileComputing

Hierarchical Mobile IPv6 (HMIPv6) is the proposed enhancement of Mobile Internet Protocol versions 6 (MIPv6) that is designed to reduce the amount of...

service set identifier (SSID)

Definition | SearchMobileComputing

A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN)... (Continued)

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close