Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

Fennec

Definition | WhatIs.com

Fennec is a version of the Firefox browser adapted for mobile phones and other small computing devices.

progressive web app (PWA)

Definition | WhatIs.com

A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app. PWAs are built to take advantage of native mobile device ...

Dublin Core

Definition | WhatIs.com

Dublin Core is an initiative to create a digital "library card catalog" for the Web.

Windows reboot loop

Definition | SearchEnterpriseDesktop

A reboot loop (or boot loop) occurs when a Windows device unexpectedly restarts at some point during its otherwise normal startup process.

HAProxy

Definition | SearchNetworking

HAProxy (High Availability Proxy), developed by HAProxy Technologies LLC, is an open source load balancer proxy for TCP and HTTP applications.

Internet Information Services (IIS)

Definition | SearchWindowsServer

Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML ...

stateless

Definition | WhatIs.com

Stateful and stateless are adjectives that describe whether a computer or computer program is designed to note and remember one or more preceding ...

Google dork query

Definition | WhatIs.com

Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description ...

mirror site

Definition | SearchStorage

A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more ...

network packet

Definition | SearchNetworking

A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close