Browse Definitions :

Browse Definitions by Alphabet

AWS - WIR

  • AWS Import/Export - AWS Import/Export is a program that enables an IT team to move large amounts of data into and out of the Amazon Web Services public cloud with portable storage devices.
  • AWS Instance Scheduler - AWS Instance Scheduler is a tool from Amazon Web Services that automates when and where a user's virtual machine instances are deployed on the public cloud.
  • AWS IoT (Amazon Web Services internet of things) - AWS IoT is an Amazon Web Services platform that collects and analyzes data from internet-connected devices and sensors -- called the internet of things -- and connects that data to AWS cloud applications.
  • AWS Key Management Service (AWS KMS) - AWS Key Management Service (KMS) is a managed service provided by Amazon Web Services (AWS) that allows companies to create, control and manage the cryptographic keys that encrypt and protect their data.
  • AWS Lambda (Amazon Web Services Lambda) - AWS Lambda is an event-driven computing service that allows developers to program serverless functions on a pay-per-use basis.
  • AWS Landing Zone - AWS Landing Zone is software provided by Amazon to help AWS customers set up a secure, multi-account AWS environment.
  • AWS Managed Services - AWS Managed Services is a set of services and tools that automate infrastructure management tasks for Amazon Web Services (AWS) deployments.
  • AWS Management Console - The AWS Management Console is a web-based application that lets users access the broad range of services included in the Amazon Web Services (AWS) platform.
  • AWS Marketplace - The AWS Marketplace is an online store managed by Amazon Web Services that allows a company to buy and sell software for deployment and development on the AWS platform.
  • AWS Migration Hub - AWS Migration Hub is a service that monitors the progress of application migrations to the Amazon Web Services (AWS) public cloud.
  • AWS Network Load Balancer (NLB) - AWS Network Load Balancer (NLB) is an Amazon Web Services tool that distributes high-performance traffic across multiple cloud instances and provides automatic scaling of resources to ensure low latency and high throughput for applications.
  • AWS On-Demand Instances (Amazon Web Services On-Demand Instances) - AWS On-Demand Instances (Amazon Web Services On-Demand Instances) are virtual servers that run in AWS Elastic Compute Cloud (EC2) or AWS Relational Database Service (RDS) and are purchased at a fixed rate per hour.
  • AWS OpsWorks (Amazon Web Services OpsWorks) - AWS OpsWorks is a cloud computing service from Amazon Web Services (AWS) that manages infrastructure deployment for cloud administrators.
  • AWS Outposts - AWS Outposts is an on-premises IT as a service (ITaaS) platform provided by Amazon Web Services (AWS).
  • AWS Partner Network (APN) - The Amazon Web Services (AWS) Partner Network (APN) is a classification endorsed by AWS for a global community of cloud service providers and vendors once they qualify for certain benchmarks.
  • AWS PrivateLink - AWS PrivateLink is a networking feature provided by Amazon Web Services (AWS) that eases and secures connectivity between Amazon Virtual Private Clouds (VPCs), other Amazon cloud services and on-premises applications.
  • AWS Reserved Instances (Amazon Reserved Instances) - AWS Reserved Instances are virtual servers spun up in Amazon Web Services, allowing cloud administrators to purchase computing power at contract pricing.
  • AWS Secrets Manager - AWS Secrets Manager is a security service to centrally manage sensitive information and eliminate the need to hard-code that information into an application.
  • AWS Serverless Application Model (AWS SAM) - AWS Serverless Application Model (AWS SAM) is a framework a developer can use to create and deploy serverless applications that run on Amazon's cloud.
  • AWS Service Catalog (Amazon Web Services Service Catalog) - The AWS Service Catalog (Amazon Web Services Service Catalog) is a product that allows cloud administrators to provision applications for end users by setting configurations within product portfolios.
  • AWS Shield - AWS Shield is a security service that protects web applications hosted on the Amazon Web Services public cloud against distributed denial of service (DDoS) attacks.
  • AWS Single Sign-On (AWS SSO) - AWS Single Sign-On (AWS SSO) is a service from Amazon Web Services that enables IT to manage user access to multiple applications and AWS accounts from a single, centralized console.
  • AWS Snowball Edge - AWS Snowball Edge is a physical appliance intended to help an enterprise migrate large volumes of data into and off of the AWS public cloud.
  • AWS Spot Fleets (Amazon Web Services Spot Fleets) - An AWS Spot Fleet (Amazon Web Services Spot Fleets) is a collection of virtual servers (instances) purchased at reduced rates within Amazon Elastic Compute Cloud (EC2).
  • AWS Step Functions - AWS Step Functions is a cloud service from Amazon Web Services that enables a developer to manage and visualize the components of distributed, multi-component applications.
  • AWS Storage Gateway (Amazon Web Services Storage Gateway) - AWS Storage Gateway securely transfers application data between on-premises software and cloud-based storage to improve application scalability and help an enterprise save costs.
  • AWS Support (Amazon Web Services Support) - AWS Support provides advice and tools for developers in the AWS cloud.
  • AWS Trusted Advisor (Amazon Web Services Trusted Advisor) - AWS Trusted Advisor is a product that allows a cloud administrator to provision Amazon Web Services resources according to best practices in four categories: cost optimization, security, fault tolerance and performance improvement.
  • AWS Web Application Firewall (AWS WAF) - AWS Web Application Firewall (WAF) is a security system that controls incoming and outgoing traffic for applications and websites based in the Amazon Web Services public cloud.
  • AWS X-Ray - AWS X-Ray is an application performance management service that enables a developer to analyze and debug applications in the Amazon Web Services (AWS) public cloud.
  • Azure Container Instances (ACI) - Azure Container Instances (ACI) is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.
  • Azure Data Studio (formerly SQL Operations Studio) - Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.
  • Azure DevOps - Azure DevOps -- rebranded from Visual Studio Team Services (VSTS) in 2018 -- is a software-as-a service (SaaS) platform from Microsoft designed to provide a comprehensive toolchain for developing and deploying software projects.
  • Azure Kubernetes Service (AKS) - Azure Kubernetes Service (AKS) is a managed container orchestration service based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.
  • Azure Migrate - Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.
  • Azure Quantum - Azure Quantum is a full-stack cloud service designed to allow users remote access to quantum computers.
  • Azure Reserved Virtual Machine Instances - Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.
  • Azure Service Fabric - Azure Service Fabric is a Platform as a Service (PaaS) offering designed to facilitate the development, deployment and management of highly-scalable and customizable applications for the Microsoft Azure cloud platform.
  • Azure SQL Data Warehouse - Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare) - The Patient Protection and Affordable Care Act (more commonly referred to as the Affordable Care Act, ACA or Obamacare) is a healthcare law passed by Congress in 2010 during the administration of President Barack Obama.
  • SAP Ariba - SAP Ariba is a software company that provides cloud-based procurement, spend management and supply chain services that enable suppliers and buyers to connect and do business globally.
  • What is APM? Application performance monitoring guide - Application performance monitoring (APM) is the collection of tools and processes designed to help IT professionals ensure that enterprise applications meet the performance, reliability and valuable user experience (UX) required by employees, partners and customers.
  • wireless access point - A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN), serving as the interconnection point between the WLAN and a fixed wire network.
Networking
  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

  • loose coupling

    Loose coupling is an approach to interconnecting the components in a system, network or software application so that those ...

Security
  • total risk

    Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.

  • steganography

    Steganography is the technique of hiding data within an ordinary, nonsecret file or message to avoid detection; the hidden data ...

  • triple extortion ransomware

    Triple extortion ransomware is a type of ransomware attack where a cybercriminal extorts their victim multiple times, namely by ...

CIO
  • microtargeting

    Microtargeting (also called micro-niche targeting) is a marketing strategy that uses consumer data and demographics to identify ...

  • business process

    A business process is an activity or set of activities that accomplish a specific organizational goal. Business processes should ...

  • business process improvement (BPI)

    Business process improvement (BPI) is a practice in which enterprise leaders analyze their business processes to identify areas ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

  • Salesforce DX

    Salesforce DX, or SFDX, is a set of software development tools that lets developers build, test and ship many kinds of ...

Close