Browse Definitions :
242 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | WhatIs

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files...

Cloud Foundry

Definition | SearchCloudComputing

Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications on public and ...

FHIR (Fast Healthcare Interoperability Resources)

Definition | SearchHealthIT

Fast Healthcare Interoperability Resources (FHIR) is an interoperability standard for electronic exchange of healthcare information.

SQL injection

Definition | SearchSoftwareQuality

A SQL injection (SQLi) is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order...

TCP/IP (Transmission Control Protocol/Internet Protocol)

Definition | SearchNetworking

TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the ...

IT monitoring

Definition | SearchITOperations

IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as ...

VMware vRealize Log Insight (formerly vCenter Log Insight)

Definition | SearchVMware

VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.

Docker Hub

Definition | SearchITOperations

Docker Hub is a cloud-based repository in which Docker users and partners create, test, store and distribute container images.

Azure Kubernetes Service (AKS)

Definition | SearchCloudComputing

Azure Kubernetes Service (AKS) is a managed container orchestration service, based on the open source Kubernetes system, which is available on the ...

blockchain storage

Definition | SearchStorage

Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across the world to store ...

URI (Uniform Resource Identifier)

Definition | WhatIs.com

A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network. There are two types of ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close