Browse Definitions :

Browse Definitions by Alphabet

ACT - MEA

  • Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • M.2 SSD - An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage expansion cards.
  • MAC address (media access control address) - A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.
  • MacBook Air - MacBook Air is a thin, lightweight laptop from Apple.
  • machine authentication - Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.
  • machine code (machine language) - Machine code, also known as machine language, is the elemental language of computers.
  • machine data - Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
  • machine learning - Machine learning (ML) is a type of artificial intelligence (AI) that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
  • machine learning algorithm - A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.
  • machine learning bias (AI bias) - Machine learning bias is a phenomenon that occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions in the machine learning process.
  • machine learning engineer (ML engineer) - A machine learning engineer (ML engineer) is a person who focuses on researching, building and designing self-running AI systems that automate predictive models.
  • machine learning operations (MLOps) - Machine learning operations (MLOps) is the integration of development/operations (DevOps) and machine learning.
  • machine teaching - Machine teaching is the emerging practice of infusing context -- and often business consequences -- into the selection of training data used in artificial intelligence (AI) machine learning so that the most relevant outputs are produced by the machine learning algorithms.
  • machine vision - Machine vision is the ability of a computer to see; it employs one or more video cameras, analog-to-digital conversion (ADC) and digital signal processing (DSP).
  • machine-generated data (MGD) - Machine-generated data (MGD) is information that is produced by mechanical or digital devices.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • Macintosh - The Macintosh (often called "the Mac") was the first widely-sold personal computer with a graphical user interface (GUI) and a mouse.
  • macOS - MacOS is the computer operating system for Apple desktops and laptops.
  • MACRA (Medicare Access and CHIP Reauthorization Act of 2015) - MACRA (Medicare Access and CHIP Reauthorization Act of 2015) is U.
  • macro virus - A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.
  • macrotrend - A macrotrend is a pervasive and persistent shift in the direction of some phenomenon on a global level.
  • magnetic field strength - Magnetic field strength is one of two ways that the intensity of a magnetic field can be expressed.
  • magnetic storage - Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World.
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • magnetic tape storage - Magnetic tape is one of the oldest technologies for electronic data storage.
  • magnetomotive force (magnetic potential) - Magnetomotive force, also known as magnetic potential, is the property of certain substances or phenomena that gives rise to magnetic field s.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • mainframe (big iron) - A mainframe (also known as 'big iron') is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer.
  • Maintenance Management Information System (MMIS) - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malware - Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
  • Malware quiz: Test your knowledge of types and terms - Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today.
  • man in the browser (MitB) - Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is capable of modifying that user's web transactions.
  • man-in-the-middle attack (MitM) - A man-in-the-middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that sells security services to businesses.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • Management and Operations (M&O) Stamp of Approval - The Management and Operations (M&O) Stamp of Approval from the Uptime Institute is a certification of the critical facilities and management operations procedures of a data center.
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • mantrap (interlocking door controller) - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • manufacturer's suggested retail price (MSRP) - Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • Manufacturing operation management (MOM) - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • manufacturing process management (MPM) - Manufacturing process management (MPM) is the discipline of defining how products are manufactured so production processes can be made more efficient and responsive.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI over HTTP (Messaging Application Programming Interface over HTTP) - MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.
  • MapR - MapR Technologies is a distributed data platform for AI and analytics provider that enables enterprises to apply data modeling to their business processes with the goal of increasing revenue, reducing costs and mitigating risks.
  • MapReduce - MapReduce is a core component of the Apache Hadoop software framework.
  • marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • margin of safety (MoS) - In statistics, the margin of error is a measure of the random variation in a survey's results.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market culture - A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees.
  • market development funds (MDF) - Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.
  • market segmentation - Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share into smaller groups.
  • marketecture (or marchitecture) - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • marketing campaign management - Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.
  • marketing stack - A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, analyze and improve their services.
  • marketing-qualified lead (MQL) - A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate that he is likely to become a customer.
  • Marketo - Marketo is a platform for the automation of marketing activities; the platform is designed for medium-sized businesses.
  • Markov model - A Markov model is a stochastic method for randomly changing systems that possess the Markov property.
  • markup - Markup refers to the sequence of characters or other symbols that you insert at certain places in a text or word processing file to indicate how the file should look when it is printed or displayed or to describe the document's logical structure.
  • martech (marketing technology) - Martech is the area of customer relationship management (CRM) concerned with creating, managing and using digital tools that make it possible for marketers to automate tasks and make data-driven decisions.
  • Martian address (Martian packet) - A Martian address is a source or destination IP address that apparently does not exist on Planet Earth and is, thus, invalid and/or non-routable.
  • Maslow’s hierarchy of needs - Maslow’s hierarchy of needs is a charted set of human requirements that are important for an individual to achieve complete development and self-actualization.
  • mass (m) - Mass (symbolized m) is a dimensionless quantity representing the amount of matter in a particle or object.
  • mass notification system (MNS) - A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.
  • Massachusetts data protection law - What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents.
  • massive open online course (MOOC) - A massive open online course (MOOC) is a free web-based distance learning program that is designed for large numbers of geographically dispersed students.
  • Master Boot Record (MBR) - The Master Boot Record (MBR) is the information in the first sector of a hard disk or a removable drive.
  • master data - Master data is the core data that is essential to operations in a specific business or business unit.
  • master data management (MDM) - Master data management (MDM) is a process that creates a uniform set of data on customers, products, suppliers and other business entities from different IT systems.
  • material requirements planning (MRP) - Material requirements planning (MRP) is a system for calculating the materials and components needed to manufacture a product.
  • Mathematical symbols - This table contains mathematical symbols and links to definitions of what they represent and how they are used.
  • matter - Matter is a substance made up of various types of particles that occupies physical space and has inertia.
  • maturity grid (maturity model) - A maturity model is a matrix for evaluating an organization's level of progress towards a goal.
  • Maven - Maven is an Apache Software Foundation build tool for project management that automates Java projects.
  • maximizer - A maximizer is an individual who consistently seeks the optimal outcome for any endeavor.
  • maximum segment size (MSS) - The maximum segment size (MSS) is the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.
  • maximum transmission unit (MTU) - The maximum transmission unit (MTU) is the largest size frame or packet -- in bytes or octets (eight-bit bytes) -- that can be transmitted across a data link.
  • MCITP (Microsoft Certified IT Professional) - An MCITP (Microsoft Certified IT Professional) is a credential that proves that an individual has a complete set of skills required to perform a particular IT job role, such as enterprise or virtualization administrator.
  • McKesson Corp. - McKesson Corp.
  • MCSA (Microsoft Certified Solutions Associate) - MCSA (Microsoft Certified Solutions Associate) is a certification program intended for people who seek entry-level jobs in an information technology (IT) environment.
  • MD5 - The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.
  • MDI/MDIX (medium-dependent interface/MDI crossover) - MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.
  • mean time to detect (MTTD) - Mean time to detect or discover (MTTD), also referred to as mean time to identify (MTTI), is a measure of how long problems exist in an IT deployment before the appropriate parties become aware of them.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that combines security information ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close