Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

jump page

Definition | WhatIs.com

In Web advertising and marketing, a jump page is a Web page that is made to appear temporarily in order to capture the user's attention as a ...

search engine results page (SERP)

Definition | WhatIs.com

A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.

EggFusion (egg-vertising)

Definition | SearchCustomerExperience

EggFusion is a company that places advertisements, freshness expiration dates or other data on eggs sold in retail stores... (Continued)

QuickPlace

Definition | SearchDomino

QuickPlace is Lotus's Web-based shared workspace software for real time collaboration among geographically dispersed participants.

address

Definition | SearchNetworking

An address can mean the unique location of either ( an Internet server, (2) a specific file (for example, a Web page), or (3) an e-mail user. It is ...

Amazon Simple Database Service (SimpleDB)

Definition | SearchAWS

Amazon Simple Database Service (SimpleDB), also known as a key value data store, is a highly available and flexible non-relational database that ...

Shellshock

Definition | SearchSecurity

Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including ...

dark social

Definition | SearchContentManagement

Dark social is a term used by marketers and search engine optimization (SEO) specialists to describe website referrals that are difficult to track. 

Atom (XML)

Definition | WhatIs.com

Atom is an XML -based file format used to syndicate content.

DNS redirection

Definition | WhatIs.com

DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close