Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

Internet Transaction Server (ITS)

Definition | SearchSAP

An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication ...

session replay

Definition | SearchSecurity

Session replay is a scheme a cracker uses to masquerade as an authorized user on an interactive Web site... (Continued)

Amazon AppStream

Definition | SearchAWS

Amazon AppStream is an Amazon Web Service (AWS) that enables compute-intensive applications to be streamed from the cloud to computing devices of all...

Universal Plug and Play (UPnP)

Definition | WhatIs.com

Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances,...

page

Definition | WhatIs.com

On the World Wide Web, a page is a file notated with the Hypertext Markup Language (HTML).

anacronym

Definition | WhatIs.com

An anacronym is an acronym or an abbreviation so old or familiar that no one remembers what its letters stand for, such as BASIC or COBOL.

phantom page

Definition | WhatIs.com

A phantom page is a Web page that is optimized for search engines rather than for humans.

SMIL (Synchronized Multimedia Integration Language)

Definition | WhatIs.com

SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize ...

TrackBack

Definition | WhatIs.com

TrackBack is a technical specification for an Internet program that allows a blogger to know when another blogger has commented upon one of his posts...

B2E (Business2Employee or Business-to-Employee)

Definition | SearchCIO

B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close