Browse Definitions :

Browse Definitions by Alphabet

J2M - JYT

  • J2ME (Java 2 Platform, Micro Edition) - J2ME (Java 2 Platform, Micro Edition) is a technology that allows programmers to use the Java programming language and related tools to develop programs for mobile wireless information devices such as cellular phones and personal digital assistants (PDAs).
  • Jack Kilby - Jack Kilby is generally credited with being the inventor of the integrated circuit (IC).
  • JAD (Joint Application Development) - JAD (Joint Application Development) is a methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops called JAD sessions.
  • jailbreaking - Jailbreaking, in a mobile device context, is the use of an exploit to remove manufacturer or carrier restrictions from a device such as an iPhone or iPad.
  • jam sync - In audio (sound) production, jam sync is a mode of device synchronization using SMPTE time code in which a slave device can furnish its own timing during the time that a master device is temporarily unstable.
  • JAQL (json query language) - JAQL is a query language for the JavaScript Object Notation (JSON) data interchange format.
  • JAR file (Java Archive) - A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.
  • Java - Java is a widely used programming language expressly designed for use in the distributed environment of the internet.
  • Java abstract class - In Java and other object oriented programming (OOP) languages, objects and classes may be abstracted, which means that they are summarized into characteristics that are relevant to the current program’s operation.
  • Java annotations - Within the Java development kit (JDK), there are simple annotations used to make comments on code, as well as meta-annotations that can be used to create annotations within annotation-type declarations.
  • Java assert - The Java assert is a mechanism used primarily in nonproduction environments to test for extraordinary conditions that will never be encountered unless a bug exists somewhere in the code.
  • Java Authentication and Authorization Service (JAAS) - The Java Authentication and Authorization Service (JAAS) is a set of application program interfaces (APIs) that can determine the identity of a user or computer attempting to run Java code, and ensure that the entity has the privilege or permission to execute the functions requested.
  • Java BufferedReader - Java BufferedReader is a public Java class that allows large volumes to be read from disk and copied to much faster RAM to increase performance over the multiple network communications or disk reads done with each read command otherwise.
  • Java Card - Java Card is an open standard from Sun Microsystems for a smart card development platform.
  • Java Champion - The Java Champion designation is awarded to leaders and visionaries in the Java technology community.
  • Java chip - The Java chip is a microchip that, when included in or added to a computer, will accelerate the performance of Java programs (including the applets that are sometimes included with Web pages).
  • Java Comparator - Java Comparator can compare objects to return an integer based on a positive, equal or negative comparison.
  • Java compiler - Generally, Java compilers are run and pointed to a programmer’s code in a text file to produce a class file for use by the Java virtual machine (JVM) on different platforms.
  • Java Cryptography Extension (JCE) - The Java Cryptography Extension (JCE) is an application program interface (API) that provides a uniform framework for the implementation of security features in Java.
  • Java Data Objects (JDO) - Java Data Objects (JDO) is an application program interface (API) that enables a Java programmer to access a database implicitly - that is, without having to make explicit Structured Query Language (SQL) statements.
  • Java Database Connectivity (JDBC) - Java Database Connectivity (JDBC) is an API packaged with the Java SE edition that makes it possible to connect from a Java Runtime Environment (JRE) to external, relational database systems.
  • Java Development Kit (JDK) - The Java Development Kit (JDK) provides the foundation upon which all applications that are targeted toward the Java platform are built.
  • Java Flight Recorder - Java Flight Recorder is a Java Virtual Machine (JVM) profiler that gathers performance metrics without placing a significant load on resources.
  • Java Foundation Classes (JFC) - Using the Java programming language, Java Foundation Classes (JFC) are pre-written code in the form of class libraries (coded routines) that give the programmer a comprehensive set of graphical user interface (GUI) routines to use.
  • Java IDE - Java IDEs typically provide language-specific features in addition to the code editor, compiler and debugger generally found in all IDEs.
  • Java keyword - Java keywords are terms that have special meaning in Java programming and cannot be used as identifiers for variables, classes or other elements within a Java program.
  • Java Message Service (JMS) - Java Message Service (JMS) is an application program interface (API) from Sun Microsystems that supports the formal communication known as messaging between computers in a network.
  • Java Mission Control - Java Mission Control is a performance-analysis tool that renders sampled JVM metrics in easy-to-understand graphs, tables, histograms, lists and charts.
  • Java Platform, Enterprise Edition (Java EE) - The Java Platform, Enterprise Edition (Java EE) is a collection of Java APIs owned by Oracle that software developers can use to write server-side applications.
  • Java Runtime Environment (JRE) - The Java Runtime Environment (JRE), also known as Java Runtime, is the part of the Java Development Kit (JDK) that contains and orchestrates the set of tools and minimum requirements for executing a Java application.
  • Java Server Page (JSP) - Java Server Page (JSP) is a technology for controlling the content or appearance of Web pages through the use of servlets, small programs that are specified in the Web page and run on the Web server to modify the Web page before it is sent to the user who requested it.
  • Java string - A Java string is a sequence of characters that exists as an object of the class java.
  • Java virtual machine (JVM) - A Java virtual machine (JVM), an implementation of the Java Virtual Machine Specification, interprets compiled Java binary code (called bytecode) for a computer's processor (or "hardware platform") so that it can perform a Java program's instructions.
  • JAVA_HOME - JAVA_HOME is an operating system (OS) environment variable which can optionally be set after either the Java Development Kit (JDK) or the Java Runtime Environment (JRE) is installed.
  • JavaBeans - JavaBeans is an object-oriented programming interface from Sun Microsystems that lets you build re-useable applications or program building blocks called components that can be deployed in a network on any major operating system platform.
  • JavaFX - JavaFX is a software development platform for the creation of both desktop aps and rich internet applications (RIAs) that can run on various devices.
  • JavaScript - JavaScript is a programming language that started off simply as a mechanism to add logic and interactivity to an otherwise static Netscape browser.
  • JavaScript hijacking - JavaScript hijacking is a technique that an attacker can use to read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML).
  • JAX-WS (Java API for XML Web Services) - Java API for XML Web Services (JAX-WS) is one of a set of Java technologies used to develop Web services.
  • JBOD (just a bunch of disks) - JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.
  • JBoss - JBoss is a division of Red Hat that provides support for the JBoss open source application server program and related middleware services marketed under the JBoss Enterprise Middleware brand.
  • JCL (job control language) - JCL (job control language) is a language for describing jobs (units of work) to the MVS, OS/390, and VSE operating systems, which run on IBM's S/390 large server (mainframe) computers.
  • JDA Software - JDA Software is a software and consultancy company that specializes in selling supply chain management products and services to businesses.
  • JDBC Connector (Java Database Connectivity Connector) - The JDBC (Java Database Connectivity) Connector is a program that enables various databases to be accessed by Java application servers that are run on the Java 2 Platform, Enterprise Edition (J2EE) from Sun Microsystems.
  • JDBC driver - A JDBC driver (Java Database Connectivity driver) is a small piece of software that allows JDBC to connect to different databases.
  • JEDEC - JEDEC is a global industry group that develops open standards for microelectronics.
  • Jenkins - Jenkins is an open source continuous integration/continuous delivery and deployment (CI/CD) automation software DevOps tool written in the Java programming language.
  • Jenkins X - Jenkins X is an open source system that provides continuous integration (CI), continuous delivery (CD) and automated testing tools designed for cloud-native applications in a Kubernetes environment.
  • jiffy - The term jiffy refers to a brief, usually unspecified, interval of time.
  • Jikes - Jikes is an open source Java compiler from IBM that adheres strictly to the Java specification and promises an "extremely fast" compilation.
  • Jira - Jira is an application lifecycle management (ALM) tool from Atlassian that provides different packages to suit various customer needs.
  • jitter - Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.
  • jitter buffer - In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.
  • Jitterbit - Jitterbit is a commercial software integration product that facilitates transport between legacy, enterprise, and on-demand computing applications.
  • JMX (Java Management Extensions) - JMX (Java Management Extensions) is a set of specifications for application and network management in the J2EE development and application environment.
  • JNDI (Java Naming and Directory Interface) - JNDI (Java Naming and Directory Interface) enables Java platform-based applications to access multiple naming and directory services.
  • job - In certain computer operating systems, a job is the unit of work that a computer operator gives to the operating system.
  • job hopper - A job hopper is someone who works briefly in one position after another rather than staying at any one job or organization long-term.
  • job scheduler - A job scheduler is a program that enables an enterprise to schedule and, in some cases, monitor computer 'batch' jobs (units of work, such as the running of a payroll program).
  • job step - In certain computer operating systems, a job step is part of a job, a unit of work that a computer operator (or a program called a job scheduler) gives to the operating system.
  • John the Ripper - John the Ripper is a popular free password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes.
  • John von Neumann - John von Neumann was the scientist who conceived a fundamental idea that serves all modern computers - that a computer's program and the data that it processes do not have to be fed into the computer while it is working, but can be kept in the computer's memory - a notion generally referred to as the stored-program computer.
  • join.me - Join.me is an online meeting and screen-sharing application by LogMeIn.
  • Joint Academic Network (JANET) - The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.
  • Joint Commission - The Joint Commission is an independent group that presently accredits 20,500 healthcare facilities in the United States by performing onsite evaluations.
  • jolt - On the Internet, jolt is a denial of service (DoS) attack caused by a very large ICMP packet that is fragmented in such a way that the targeted machine is unable to reassemble it for use.
  • Joomla! - Joomla! is a free open source website development and content management (CMS) platform.
  • joule - The joule (pronounced DJOOL) is the standard unit of energy in electronics and general scientific applications.
  • JPEG (Joint Photographic Experts Group) - JPEG (Joint Photographic Experts Group) is an ISO/IEC group of experts that develops and maintains standards for a suite of compression algorithms for computer image files.
  • jQuery - jQuery is an open-sourced JavaScript library that simplifies creation and navigation of web applications.
  • JRun - JRun is an application server from Macromedia that is based on Sun Microsystems' Java 2 Platform, Enterprise Edition (J2EE).
  • JSON (JavaScript Object Notation) - JSON (JavaScript Object Notation) is a text-based, human-readable data interchange format used to exchange data between web clients and web servers.
  • JTAPI (Java Telephony Application Programming Interface) - JTAPI (Java Telephony Application Programming Interface) is a Java-based application programming interface (API) for computer telephony applications.
  • judder - Judder is a television screen artifact that occurs when content recorded on film is shown on a television with a 60Hz refresh rate.
  • juice jacking - Juice jacking is a security exploit in which an infected USB charging station is used to compromise connected devices.
  • Julian calendar - The Julian calendar was the 365-day calendar that Julius Caesar made official in 46 B.
  • Julian date - Not to be confused with the Julian calendar, a Julian date or day number is the number of elapsed days since the beginning of a cycle of 7,980 years invented by Joseph Scaliger in 1583.
  • jumbo frames - A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes.
  • jumper - In a computer, a jumper is a pair of prongs that are electrical contact points set into the computer motherboard or an adapter card.
  • JUnit - JUnit is an open source framework designed for the purpose of writing and running tests in the Java programming language.
  • Just Enough Administration (JEA) - Just Enough Administration (JEA) is a PowerShell toolkit designed to help an organization reduce risk by restricting IT administrative rights.
  • just-in-time compiler (JIT) - A just-in-time (JIT) compiler is a program that turns bytecode into instructions that can be sent directly to a computer's processor (CPU).
  • just-in-time manufacturing (JIT manufacturing) - Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production model).
  • Jython - Jython is an open source implementation of the Python programming language, integrated with the Java platform.
SearchNetworking
  • network security

    Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.

  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • digital marketing

    Digital marketing is a general term for any effort by a company to connect with customers through electronic technology.

  • hockey stick growth

    Hockey stick growth is a growth pattern in a line chart that shows a sudden and extremely rapid growth after a long period of ...

  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

Close