Browse Definitions :
242 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | WhatIs

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files...

Web Bluetooth

Definition | WhatIs.com

Web Bluetooth is an API that enables interaction with Bluetooth devices through web browsers.

address

Definition | SearchNetworking

An address can mean the unique location of either ( an Internet server, (2) a specific file (for example, a Web page), or (3) an e-mail user. It is ...

modem doubling

Definition | SearchNetworking

Modem doubling is an inexpensive way for a user who wants a fast Internet connection, but can only connect with an analog telephone line, to use two ...

absolute link

Definition | WhatIs.com

An absolute link is a hyperlink containing a full URL, which includes all the information needed to find a particular site, page or document or other...

Shellshock

Definition | SearchSecurity

Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including ...

Internet Storm Center

Definition | WhatIs.com

The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about ...

electrical estimating software

Definition | WhatIs.com

Electrical estimating software is a collection of programs, processes and information that provides electrical contractors with the tools necessary ...

Constrained Application Protocol (CoAP)

Definition | WhatIs.com

Constrained Application Protocol (CoAP) is a protocol for low-power compute-constrained devices to operate in the internet of things (IoT).

Click to Tweet

Definition | WhatIs.com

Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.

iPlanet

Definition | WhatIs.com

iPlanet is Sun Microsystem's solution for a Web server and related programs intended to allow an enterprise to take advantage of the Internet.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close