Browse Definitions :

Browse Definitions by Alphabet

HA - HOM

  • HA storage (high-availability storage) - High-availability storage (HA storage) is a storage system that is continuously operational or provides at least 99% uptime.
  • hackathon - A hackathon, also known as a codefest, is a social coding event that brings computer programmers and other interested people together to improve upon or build a new software program.
  • hacker - A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
  • hacking as a service (HaaS) - Hacking as a service (HaaS) is the commercialization of hacking skills, in which the hacker serves as a contractor.
  • hacktivism - Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
  • Hadoop as a service (HaaS) - Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in the cloud using Hadoop.
  • Hadoop cluster - A Hadoop cluster is a special type of computational cluster designed specifically for storing and analyzing huge amounts of unstructured data in a distributed computing environment.
  • Hadoop data lake - A Hadoop data lake is a data management platform comprising one or more Hadoop clusters.
  • Hadoop Distributed File System (HDFS) - The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications.
  • hairpinning - In general telecommunication, hairpinning is returning a message from an origin endpoint back in the direction it came from as a way to get it to its destination endpoint.
  • half-duplex - Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time.
  • hamburger icon (slide drawer navigation) - The hamburger icon got its name because it resembles a burger in a bun.
  • Hamming code - Hamming code is an error correction system that can detect and correct errors when data is stored or transmitted.
  • happy path testing - Happy-path testing is a type of software testing that uses known input and produces an expected output.
  • HAProxy - HAProxy (High Availability Proxy), developed by HAProxy Technologies LLC, is an open source load balancer proxy for TCP and HTTP applications.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • hard copy (printout) - A hard copy (or "hardcopy") is a printed copy of information from a computer.
  • hard disk drive (HDD) - A computer hard disk drive (HDD) is a non-volatile data storage device.
  • hard drive shredder - A hard drive shredder is a mechanical device that physically destroys old hard drives in such a way that the data they contain cannot be recovered.
  • hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory.
  • hard skills - Hard skills are specific abilities, or capabilities, that an individual can possess and demonstrate in a measured way.
  • hard-drive encryption - Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.
  • hardcode - In computer programming or text markup, to hardcode (less frequently, hard code) is to use an explicit rather than a symbolic name for something that is likely to change at a later time.
  • hardware abstraction layer (HAL) - In computers, a hardware abstraction layer (HAL) is a layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level.
  • hardware clustering - Hardware clustering is a hardware-based method of turning multiple servers into a cluster (a group of servers that acts like a single system).
  • hardware emulation - Hardware emulation is the use of one hardware device to mimic the function of another hardware device.
  • hardware RAID (hardware redundant array of independent disk) - Hardware RAID is a form of RAID where processing is done externally.
  • hardware security - Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.
  • hardware security module (HSM) - A hardware security module (HSM) is a physical device that provides extra security for sensitive data.
  • hardware virtualization - Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.
  • hardware vulnerability - A hardware vulnerability is an exploitable weakness in a computer system that enables attack through remote or physical access to system hardware.
  • hardware-as-a-service (in managed services) - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer's site and a service level agreement (SLA) defines the responsibilities of both parties.
  • hardware-assisted virtualization - Hardware-assisted virtualization is the use of a computer's physical components to support the software that creates and manages virtual machines (VMs).
  • harmonic - A harmonic is a wave or signal whose frequency is an integral (whole number) multiple of the frequency of the same reference signal or wave.
  • Hash-based Message Authentication Code (HMAC) - Hash-based Message Authentication Code (HMAC) is a message authentication code that uses a cryptographic key in conjunction with a hash function.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • hashing - Hashing is the process of transforming any given key or a string of characters into another value.
  • Hawthorne effect - The Hawthorne effect is the modification of behavior by study participants in response to their knowledge that they are being observed or singled out for special treatment.
  • HCI (human-computer interaction) - HCI (human-computer interaction) is the study of how people interact with computers and to what extent computers are or are not developed for successful interaction with human beings.
  • HD-DVD (high-definition DVD) - HD-DVD (high-definition DVD) is a defunct high-capacity optical storage medium that was once seen as the successor to the DVD.
  • HDD form factor (hard disk drive form factor) - HDD form factor is the size or geometry of a hard disk drive, determining the device’s compatibility with the drive bays in a storage array or enclosure, server, portable computer or other computing device.
  • HDLC (High-level Data Link Control) - HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).
  • HDMI - HDMI (High Definition Multimedia Interface) is a specification that combines video and audio into a single digital interface for use with digital versatile disc (DVD) players, digital television (DTV) players, set-top boxes, and other audiovisual devices.
  • HDTV (high definition television) - HDTV (high definition television) is a television display technology that provides picture quality similar to 35 mm.
  • head tracking - Head tracking is a software application that monitors a user’s head position and orientation.
  • headless CMS (headless content management system) - A headless content management system (CMS) delivers back-end capabilities for editing, organizing and storing all types of digital information, without regard to how that content is published, displayed or used.
  • headless commerce (headless e-commerce) - Headless commerce, also called headless e-commerce, is a platform architecture that decouples the front end of an e-commerce website with the back end.
  • headless server - A headless server is a computing device without a local interface that is dedicated to providing services to other computers and their users.
  • headless system - A headless system is a computer that operates without a monitor, graphical user interface (GUI) or the typical peripherals used to control it, such as a keyboard and mouse.
  • heads-up display (HUD) - A heads-up display (HUD) is a transparent or miniaturized display technology that does not require users to shift their gaze from where they are naturally looking.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health Information Exchange (HIE) - Health information exchange (HIE) is the electronic transmission of healthcare-related data among medical facilities, health information organizations -- companies that oversee and govern the exchange of this data -- and government agencies according to national standards.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Healthcare CIO (healthcare chief information officer) - A healthcare CIO is a healthcare executive with an influence over technology purchasing and other IT business decisions.
  • heap - In certain programming languages including C and Pascal, a heap is an area of pre-reserved computer main storage (memory) that a program process can use to store data in some variable amount that won't be known until the program is running.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • Heartbleed - Heartbleed is a vulnerability in some implementations of OpenSSL.
  • heat - Heat is the transfer of kinetic energy from one medium or object to another, or from an energy source to a medium or object.
  • heat map (heatmap) - A heat map is a two-dimensional representation of data in which values are represented by colors.
  • HELLO packet - A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.
  • help desk - A help desk is the individual, group, organizational function or external service that an IT user calls to get help with a problem.
  • henry (H) - The henry (symbolized H) is the Standard International (SI) unit of inductance.
  • henry per meter (H/m) - The henry per meter (symbolized H/m) is the unit of magnetic permeability in the International System of Units (SI).
  • hertz - Hertz is a unit of frequency (of change in state or cycle in a sound wave, alternating current, or other cyclical waveform) of one cycle per second.
  • heuristic - As an adjective, heuristic (pronounced hyu-RIS-tik and from the Greek "heuriskein" meaning "to discover") pertains to the process of gaining knowledge or some desired result by intelligent guesswork rather than by following some preestablished formula.
  • Hewlett Packard Enterprise (HP Enterprise, HPE) - Hewlett Packard Enterprise (HP Enterprise, also known as HPE) is an American multinational company that specializes in business IT (information technology).
  • Hewlett-Packard (HP) - HP (Hewlett-Packard) is a prominent IT company based in Palo Alto, California.
  • hexadecimal - Hexadecimal is a numbering system with base 16.
  • Hibernate - Hibernate is an open source object relational mapping (ORM) tool that provides a framework to map object-oriented domain models to relational databases for web applications.
  • Hick's law - Hick's law is a psychological principle which states that the more options are available to a person, the longer it will take for him or her to make a decision about which option is best.
  • hierarchical corporate culture - A hierarchical corporate culture is an organizational model based on clearly defined corporate levels and structures.
  • hierarchical storage management (HSM) - Hierarchical storage management (HSM) is policy-based management of data files that uses storage media economically and without the user being aware of when files are retrieved from storage.
  • hierarchy - Generally speaking, hierarchy refers to an organizational structure in which items are ranked in a specific manner, usually according to levels of importance.
  • high availability (HA) - High availability (HA) is the ability of a system to operate continuously without failing for a designated period of time.
  • high availability cluster (HA cluster) - A high availability cluster is a group of hosts that act like a single system and provide continuous uptime.
  • high-performance computing - High-performance computing (HPC) is the practice of using parallel data processing to improve computing performance and perform complex calculations.
  • high-touch customer service - High-touch customer service refers to the idea that some customer service issues are complex or high value and thus require human interaction to resolve, not just digital technologies -- such FAQ sections or online customer communities -- to solve.
  • HIMSS (Healthcare Information and Management Systems Society) - The Healthcare Information and Management Systems Society (HIMSS) is a nonprofit organization whose goal is to promote the best use of IT and management systems in the healthcare industry.
  • HIPAA (Health Insurance Portability and Accountability Act) - HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information.
  • HIPAA disaster recovery plan - A HIPAA disaster recovery plan is a document that specifies the resources, actions, personnel and data that are required to protect and reinstate healthcare information in the event of a fire, vandalism, natural disaster or system failure.
  • HireVue - HireVue is an enterprise video interviewing technology vendor that allows recruiters and hiring managers to screen candidates and conduct live interviews over the Internet.
  • histogram - A histogram is a display of statistical information that uses rectangles to show the frequency of data items in successive numerical intervals of equal size.
  • historical data - Historical data, in a broad context, is data collected about past events and circumstances pertaining to a particular subject.
  • Hitachi Vantara (formerly Hitachi Data Systems or HDS) - Hitachi Vantara is a data storage systems provider, previously known as Hitachi Data Systems (HDS).
  • HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 - The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to stimulate the adoption of electronic health records (EHR) and the supporting technology in the United States.
  • HL7 (Health Level Seven International) - HL7 (Health Level Seven International) is a set of standards, formats and definitions for exchanging and developing electronic health records (EHRs).
  • hockey stick growth - Hockey stick growth is a growth pattern in a line chart that shows a sudden and extremely rapid growth after a long period of linear growth.
  • Hofstadter's law - Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.
  • holacracy - A holacracy is a governance structure characterized by a distribution of power among self-organizing groups, rather than the typical top-down hierarchical corporate culture model.
  • hole - In physics, a hole is an electric charge carrier with a positive charge, equal in magnitude but opposite in polarity to the charge on the electron.
  • holistic (holistic technology) - Holistic (holistic technology) is a concept concerned with treatment of entire systems, rather than the analysis, treatment or segmentation of parts of those systems.
  • holistic security - Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system.
  • hologram - A hologram (pronounced HOL-o-gram) is a three-dimensional image, created with photographic projection.
  • holographic print - A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.
  • holographic storage (holostorage) - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.
  • Home Location Register (HLR) - The Home Location Register (HLR) is the main database of permanent subscriber information for a mobile network.
  • home page - For a Web user, the home page is the first Web page that is displayed after starting a Web browser like Netscape's Navigator or Microsoft's Internet Explorer.
  • home server - A home server is a computer that functions as a server in a client-server home network.
  • homomorphic encryption - Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.
SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close