Browse Definitions :
228 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | searchWinDevelopment

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the...

Internet Protocol suite (IP suite)

Definition | WhatIs.com

Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer ...

arachniography

Definition | WhatIs.com

An arachniography (pronounced uh-RAK-nee-AH-gruf-ee) is a bibliography of Web pages.

Microsoft Azure Functions

Definition | SearchCloudComputing

Azure Functions is the serverless computing service hosted on the Microsoft Azure public cloud.

Web site

Definition | WhatIs.com

This definition is also listed under presence, site and Website.

UDDI (Universal Description, Discovery, and Integration)

Definition | SearchMicroservices

UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.

transaction monitoring (business transaction management)

Definition | WhatIs.com

Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing ...

stateful app

Definition | WhatIs.com

A stateful app is a program that saves client data from the activities of one session for use in the next session. The data that is saved is called ...

AWS Web Application Firewall (AWS WAF)

Definition | SearchAWS

AWS Web Application Firewall (WAF) is a security system that controls incoming and outgoing traffic for applications and websites based in the Amazon...

Amazon SWF (Simple WorkFlow Service)

Definition | SearchAWS

Amazon SWF (Simple Workflow Service) is an Amazon Web Services tool that helps developers coordinate, track and audit multi-step, multi-machine ...

browser extension malware

Definition | WhatIs.com

Extension malware is any browser extension that was developed intentionally with coding that causes undesirable behaviors or whose code has been ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close