Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

2D barcode (two-dimensional barcode)

Definition | SearchMobileComputing

A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and ...

.Tel

Definition | SearchUnifiedCommunications

.Tel is a top-level domain (TLD) intended for universal text naming and navigation in Internet-based communications... (Continued)

pagejacking

Definition | WhatIs.com

Pagejacking is stealing the contents of a Web site by copying some of its pages, putting them on a site that appears to be the legitimate site, and ...

deep Web

Definition | WhatIs.com

Deep Web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records...

search operator

Definition | WhatIs.com

A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the ...

tag management system

Definition | WhatIs.com

A tag management system (TMS) is a software solution used to manage the tags used in digital marketing. Tags are the special headers on websites, ...

digital photo album

Definition | WhatIs.com

A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer ...

dimension

Definition | SearchDataManagement

In data warehousing, a dimension is a collection of reference information about a measurable event (fact).

Electronic Commerce (EC Directive) Regulations 2002

Definition | WhatIs.com

The Electronic Commerce (EC Directive) Regulations 2002 establishes legal rules that online retailers and service providers must comply with when ...

port

Definition | SearchNetworking

On computer and telecommunication devices, a port (noun) is generally a specific place for being physically connected to some other device, usually ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close