Browse Definitions :
480 results for:

black box

black box (black box testing)

Definition | SearchSoftwareQuality

Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate ...

ATM black box attack

Definition | SearchSecurity

An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes into the top of the ...

gray box testing (gray box)

Definition | SearchSoftwareQuality

Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the ...

out of the box

Definition | SearchCIO

"Out of the box" is an expression that describes nonconformal, creative thinking.

PIP box (picture in picture box)

Definition | WhatIs.com

A PIP box (picture in picture box) is the graphic image you manipulate in the FX monitor when creating a Picture in a Picture effect.

Box (Box.net)

Definition | SearchMobileComputing

Box is an online file-sharing, storage and collaboration service provider that caters to individual users as well as businesses.

black hat

Definition | SearchSecurity

Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security ...

white box testing

Definition | SearchSoftwareQuality

White box testing is a software testing methodology in which the code structure is known and understood by the tester.

black hole

Definition | WhatIs.com

The term "black hole" is sometimes used to refer to an imaginary place where objects, files, or funds go when they get lost for no apparent reason.

loot box

Definition | WhatIs.com

In video games, a loot box is an in-game purchase consisting of a virtual container that awards players with items and modifications based on chance....

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close