Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

cruft

Definition | SearchSoftwareQuality

Cruft is the elements of a program, system or product that are either useless, poorly designed or both. In computing, cruft describes areas of ...

dimension table

Definition | SearchDataManagement

A dimension table is a table in a star schema of a data warehouse. A dimension table stores attributes, or dimensions, that describe the objects in a...

gaming the system

Definition | WhatIs.com

Gaming the system is manipulation or exploitation of the rules designed to govern a given system in an attempt to gain an advantage over other users....

Advanced Television Enhancement Forum (ATVEF)

Definition | WhatIs.com

The Advanced Television Enhancement Forum (ATVEF) is an alliance of leaders in the broadcast and cable industry, the consumer electronics industry, ...

transparent computing

Definition | WhatIs.com

Transparent computing is a characteristic of pervasive computing, the possible future state in which we will be surrounded by computers everywhere in...

social bookmarking

Definition | WhatIs.com

Social bookmarking is a user-defined taxonomy system for bookmark s.

personalized search

Definition | WhatIs.com

Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.” ...

search engine

Definition | WhatIs.com

A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.

Dropbox

Definition | SearchMobileComputing

Dropbox is a cloud storage provider (sometimes referred to as an online backup service) that is frequently used as a file-sharing service.

Apple 3D Touch

Definition | SearchMobileComputing

Apple 3D Touch is a pressure-sensitive feature first included in iPhone 6s and 6s Plus that triggers different actions based on how much force the ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close