Browse Definitions :
242 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | WhatIs

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files...

AWS IoT (Amazon Web Services internet of things)

Definition | SearchAWS

AWS IoT is an Amazon Web Services platform that collects and analyzes data from internet-connected devices and sensors -- called the internet of ...

Top 10 Spyware Threats

Definition | WhatIs.com

Visit our spyware feature page to learn more about this problem and how SMBs can beat it.

AWS Shield

Definition | SearchAWS

AWS Shield is a security service that protects web applications hosted on the Amazon Web Services public cloud against distributed denial of service ...

DLT (digital linear tape)

Definition | SearchDataBackup

Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format. Learn more about ...

Networking (computer)

Definition | SearchNetworking

Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an ...

Nagios

Definition | SearchITOperations

Nagios is an open source monitoring system for computer systems.

Clinical Document Architecture (CDA)

Definition | SearchHealthIT

Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge ...

Rock Phish

Definition | SearchSecurity

Rock Phish is both a phishing toolkit and the entity that publishes the kit, either a hacker, or, more likely, a sophisticated group of hackers. ...

OpenStack Swift

Definition | SearchStorage

OpenStack Swift, also known as OpenStack Object Storage, is an open source object storage system that is licensed under the Apache 2.0 license and ...

MIM (MME)

Definition | WhatIs.com

A MIM or MME file is a file in the Multi-Purpose Internet Mail Extensions (MIME) format that is created by some e-mail programs, including that of ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close