Browse Definitions :
242 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | WhatIs

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files...

Amazon Silk

Definition | WhatIs.com

Silk is the browser that Amazon developed for the Kindle Fire tablet computer.

Peachtree

Definition | WhatIs.com

Peachtree is an accounting application for small and medium-sized businesses (SMBs) made by Sage Software.

404 (status code)

Definition | WhatIs.com

404 is a frequently-seen status code that tells a Web user that a requested page is "Not found."

Internet Protocol suite (IP suite)

Definition | WhatIs.com

Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer ...

arachniography

Definition | WhatIs.com

An arachniography (pronounced uh-RAK-nee-AH-gruf-ee) is a bibliography of Web pages.

TrackBack

Definition | WhatIs.com

TrackBack is a technical specification for an Internet program that allows a blogger to know when another blogger has commented upon one of his posts...

Web site

Definition | WhatIs.com

This definition is also listed under presence, site and Website.

transaction monitoring (business transaction management)

Definition | WhatIs.com

Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing ...

stateful app

Definition | WhatIs.com

A stateful app is a program that saves client data from the activities of one session for use in the next session. The data that is saved is called ...

Amazon SWF (Simple WorkFlow Service)

Definition | SearchAWS

Amazon SWF (Simple Workflow Service) is an Amazon Web Services tool that helps developers coordinate, track and audit multi-step, multi-machine ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close