Browse Definitions :
228 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | searchWinDevelopment

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the...

Regin malware

Definition | SearchSecurity

Regin is a complex strain of back-door Trojan malware that uses a multi-staged, modular approach to infect its targets for the purpose of monitoring ...

service-level objective

Definition | SearchITChannel

A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer ...

File Transfer Protocol (FTP)

Definition | SearchNetworking

File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

bogon

Definition | SearchNetworking

A bogon is an illegitimate IP address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet ...

Network Protocols

Definition | SearchNetworking

Network protocols are sets of established rules that dictate how to format, transmit and receive data so computer network devices -- from servers and...

Open Buying on the Internet (OBI)

Definition | SearchCIO

OBI (Open Buying on the Internet) is a proposed standard for business-to-business purchasing on the Internet, aimed particularly at high-volume, ...

Fair Information Practices (FIP)

Definition | WhatIs.com

FIP (Fair Information Practices) is a general term for a set of standards governing the collection and use of personal data and addressing issues of ...

multiprotocol storage

Definition | SearchStorage

Multiprotocol storage, also known as unified or federated storage, supports protocols traditionally associated with SAN block-based and NAS ...

host intrusion prevention systems (HIPS)

Definition | SearchEnterpriseDesktop

A host intrusion prevention system (HIPS) is a security method that relies on third-party software tools to monitor network traffic and system ...

IPTV (Internet Protocol television)

Definition | SearchNetworking

IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close