Browse Definitions :
228 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | searchWinDevelopment

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the...

microservices

Definition | SearchMicroservices

Microservices, or microservice architecture, is an approach to application development in which a large application is built as a suite of modular ...

vulnerability disclosure

Definition | SearchSecurity

Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines...

firewall

Definition | SearchSecurity

In computing, a firewall is software or firmware that protects the resources of a private network from users on other networks.

Microsoft Exchange Server

Definition | SearchWindowsServer

Microsoft Exchange Server is Microsoft's email, calendaring, contact, scheduling and collaboration platform deployed on the Windows Server operating ...

IPsec (Internet Protocol Security)

Definition | SearchSecurity

IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.

application program interface (API)

Definition | SearchMicroservices

An application program interface (API) is code that allows two software programs to communicate with each other.

z/OS

Definition | SearchDataCenter

Z/OS is a 64-bit operating system (OS) developed by IBM for its family of z/Architecture enterprise mainframe computers, including the zEnterprise ...

Oracle

Definition | SearchOracle

Oracle is one of the largest vendors in the enterprise IT market and the shorthand name of its flagship product, a relational database management ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close