Browse Definitions :
244 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | WhatIs

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files...

Same Origin Policy (SOP)

Definition | SearchSecurity

The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript ...

Hand of Thief

Definition | WhatIs.com

Hand of Thief is banking crimeware that targets Linux operating systems. The Hand of Thief uses a form grabber to steal IDs, passwords and other ...

Open Settlement Protocol (OSP)

Definition | SearchUnifiedCommunications

Open Settlement Protocol (OSP) is a client-server protocol that manages access control, accounting, usage data and inter-domain routing to make it ...

SMS gateway

Definition | SearchMobileComputing

An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway. An SMS ...

Internet map

Definition | WhatIs.com

An Internet map is any kind of map that attempts to portray all or some aspect of the Internet.

load balancing

Definition | SearchNetworking

Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, ...

gRPC

Definition | SearchAppArchitecture

gRPC is a high performance, open source framework developed by Google to handle remote procedure calls (RPCs).

Apache Solr

Definition | TheServerSide.com

Apache Solr is an open source search platform built upon a Java library called Lucene.

path

Definition | SearchNetworking

In a computer operating system, a path is the route through a file system to a particular file.

Gopher

Definition | WhatIs.com

From about 1992 through 1996, Gopher was an Internet application in which hierarchically-organized text files could be brought from servers all over ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close