Browse Definitions :
242 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | WhatIs

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files...

FTP (File Transfer Protocol)

Definition | SearchNetworking

File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

MIM (MME)

Definition | WhatIs.com

A MIM or MME file is a file in the Multi-Purpose Internet Mail Extensions (MIME) format that is created by some e-mail programs, including that of ...

API testing

Definition | SearchAppArchitecture

API testing refers to various methods of software testing used to determine if application programming interfaces (APIs) meet expectations of ...

browser

Definition | SearchWinDevelopment

A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.

OWASP Top Ten

Definition | SearchSoftwareQuality

The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.

Web development freeware and shareware

Definition | SearchSoftwareQuality

Web development freeware and shareware

CIFS (Common Internet File System)

Definition | SearchStorage

CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet ...

edge computing

Definition | SearchDataCenter

Edge computing is an IT architecture in which raw data is processed as near to the data source as possible instead of being sent over the Internet to...

Google Cloud Functions

Definition | SearchCloudComputing

Google Cloud Functions is a serverless, event-driven computing service within Google Cloud Platform.

authentication

Definition | SearchSecurity

Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close