Browse Definitions :

Browse Definitions by Alphabet

  • jailbreaking - Jailbreaking, in a mobile device context, is the use of an exploit to remove manufacturer or carrier restrictions from a device such as an iPhone or iPad.
  • JAR file (Java Archive) - A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.
  • Java - Java is a widely used programming language expressly designed for coding applications and services used in the distributed environment of the internet.
  • Java assert - The Java assert is a mechanism used primarily in nonproduction environments to test for extraordinary conditions that will never be encountered unless a bug exists somewhere in the code.
  • Java Authentication and Authorization Service (JAAS) - The Java Authentication and Authorization Service (JAAS) is a set of application program interfaces (APIs) that can determine the identity of a user or computer attempting to run Java code, and ensure that the entity has the privilege or permission to execute the functions requested.
  • Java compiler - A Java compiler is a program that takes the text file work of a developer and compiles it into a platform-independent Java file.
  • Java Cryptography Extension (JCE) - The Java Cryptography Extension (JCE) is an application program interface (API) that provides a uniform framework for the implementation of security features in Java.
  • Java Database Connectivity (JDBC) - Java Database Connectivity (JDBC) is an API packaged with the Java SE edition that makes it possible to connect from a Java Runtime Environment (JRE) to external, relational database systems.
  • Java Development Kit (JDK) - The Java Development Kit (JDK) provides the foundation upon which all applications that are targeted toward the Java platform are built.
  • Java Flight Recorder - Java Flight Recorder is a Java Virtual Machine (JVM) profiler that gathers performance metrics without placing a significant load on resources.
  • Java Mission Control - Java Mission Control is a performance-analysis tool that renders sampled JVM metrics in easy-to-understand graphs, tables, histograms, lists and charts.
  • Java Runtime Environment (JRE) - The Java Runtime Environment (JRE), also known as Java Runtime, is the part of the Java Development Kit (JDK) that contains and orchestrates the set of tools and minimum requirements for executing a Java application.
  • Java string - A Java string is a sequence of characters that exists as an object of the class java.
  • Java virtual machine (JVM) - A Java virtual machine (JVM), an implementation of the Java Virtual Machine Specification, interprets compiled Java binary code (called bytecode) for a computer's processor (or "hardware platform") so that it can perform a Java program's instructions.
  • JAVA_HOME - JAVA_HOME is an operating system (OS) environment variable which can optionally be set after either the Java Development Kit (JDK) or the Java Runtime Environment (JRE) is installed.
  • JavaScript - JavaScript is a programming language that started off simply as a mechanism to add logic and interactivity to an otherwise static Netscape browser.
  • JAX-WS (Java API for XML Web Services) - Java API for XML Web Services (JAX-WS) is one of a set of Java technologies used to develop Web services.
  • JBOD (just a bunch of disks) - JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.
  • JCL (job control language) - JCL (job control language) is a language for describing jobs (units of work) to the MVS, OS/390, and VSE operating systems, which run on IBM's S/390 large server (mainframe) computers.
  • JDA Software - JDA Software is a software and consultancy company that specializes in selling supply chain management products and services to businesses.
  • JEDEC - JEDEC is a global industry group that develops open standards for microelectronics.
  • Jenkins - Jenkins is an open source continuous integration/continuous delivery and deployment (CI/CD) automation software DevOps tool written in the Java programming language.
  • Jenkins X - Jenkins X is an open source system that provides continuous integration (CI), continuous delivery (CD) and automated testing tools designed for cloud-native applications in a Kubernetes environment.
  • Jira - Jira is an application lifecycle management (ALM) tool from Atlassian that provides different packages to suit various customer needs.
  • jitter - Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.
  • jitter buffer - In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.
  • Jitterbit - Jitterbit is a commercial software integration product that facilitates transport between legacy, enterprise, and on-demand computing applications.
  • job - In certain computer operating systems, a job is the unit of work that a computer operator -- or a program called a job scheduler -- gives to the OS.
  • job scheduler - A job scheduler is a computer program that enables an enterprise to schedule and, in some cases, monitor computer 'batch' jobs (units of work).
  • job step - In certain computer operating systems, a job step is part of a job, a unit of work that a computer operator (or a program called a job scheduler) gives to the operating system.
  • Joint Academic Network (JANET) - The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.
  • joint application development (JAD) - Joint application development, frequently shortened to JAD, is a methodology that involves the client or end user in the design and development of a software application through a succession of collaborative workshops called JAD sessions.
  • Joint Commission - The Joint Commission is an independent group that presently accredits 20,500 healthcare facilities in the United States by performing onsite evaluations.
  • JOLAP (Java Online Analytical Processing) - JOLAP (Java Online Analytical Processing) is a Java application-programming interface (API) for the Java 2 Platform, Enterprise Edition (J2EE) environment that supports the creation, storage, access, and management of data in an online analytical processing (OLAP) application.
  • JPEG (Joint Photographic Experts Group) - JPEG (pronounced JAY-peg) is a graphic image file compressed with lossy compression using the standard developed by the ISO/IEC Joint Photographic Experts Group.
  • jQuery - jQuery is an open-sourced JavaScript library that simplifies creation and navigation of web applications.
  • JSON (JavaScript Object Notation) - JSON (JavaScript Object Notation) is a text-based, human-readable data interchange format used to exchange data between web clients and web servers.
  • judder - Judder is a television screen artifact that occurs when content recorded on film is shown on a television with a 60Hz refresh rate.
  • juice jacking - Juice jacking is a security exploit in which an infected USB charging station is used to compromise devices that connect to it.
  • Julian calendar - The Julian calendar was the 365-day calendar that Julius Caesar made official in 46 B.
  • jumbo frames - A jumbo frame is an Ethernet frame, or data packet, with a payload greater than the standard size of 1,500 bytes.
  • just-in-time compiler (JIT) - A just-in-time (JIT) compiler is a program that turns bytecode into instructions that can be sent directly to a computer's processor (CPU).
  • just-in-time manufacturing (JIT manufacturing) - Just-in-time manufacturing (JIT manufacturing) is a production model in which items are created to meet demand, not created in surplus or in advance of need.
  • Jython - Jython is an open source implementation of the Python programming language, integrated with the Java platform.
Networking
Security
  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.

  • malware

    Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.

  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close