Browse Definitions :
629 results for:

IPv6

IPv6 (Internet Protocol Version 6)

Definition | searchNetworking

IPv6 (Internet Protocol Version 6) is the latest level of the Internet Protocol (IP) and is now included as part of IP support in many products ...

Mobile IPv6 (MIPv6 or Mobile Internet Protocol version 6)

Definition | SearchMobileComputing

Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.

IPv6 address

Definition | IoT Agenda

An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. The...

Hierarchical Mobile IPv6 (HMIPv6)

Definition | SearchMobileComputing

Hierarchical Mobile IPv6 (HMIPv6) is the proposed enhancement of Mobile Internet Protocol versions 6 (MIPv6) that is designed to reduce the amount of...

6to4

Definition | SearchNetworking

6to4 is a tunneling mechanism used to transfer IPv6 (Internet Protocol version 6) packets over an IPv4 infrastructure, typically the IPv4 Internet. ...

IPv4 address class

Definition | WhatIs.com

An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing. Separate IP classes are used for different ...

K6 (AMD-K6)

Definition | WhatIs.com

K6 (referred to by its manufacturer as AMD-K6) is a line of microprocessors from AMD that compete with Intel's Pentium series of microprocessors.

NAT64

Definition | WhatIs.com

NAT64 is a proposed mechanism for translating IPv6 packets to IPv4 packets and vice-versa.

AAAA resource record

Definition | WhatIs.com

An AAAA resource record is a record that stores a single IPv6 address.

Information Assurance Standard 6 (IAS 6)

Definition | WhatIs.com

The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

Close