Browse Definitions :

Browse Definitions by Alphabet

ACT - MAS

  • Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • M-theory - M-theory (the "M" stands for the mother of all theories, magic, mystery, or matrix, depending on the source) is an adaptation of superstring theory developed by Ed Witten of Princeton and Paul Townsend of Cambridge.
  • M.2 SSD - An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage expansion cards.
  • M2M economy (machine-to-machine economy) - A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts.
  • MAC address (Media Access Control address) - In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number.
  • Mac mini - The Mac mini from Apple is a low-cost and very compact personal computer that runs the Mac OS X operating system and is sold without a display, keyboard, or mouse.
  • MacBook Air - MacBook Air is a thin, lightweight laptop from Apple.
  • machine authentication - Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.
  • machine behavior - Machine behavior is an emerging field of study that explores the ways that intelligent agents behave, similarly to the way that many scientific disciplines explore the behavior of humans.
  • machine code (machine language) - Machine code, also known as machine language, is the elemental language of computers.
  • machine data - Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
  • machine learning - Machine learning (ML) is a type of artificial intelligence (AI) that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
  • machine learning algorithm - A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.
  • machine learning bias (AI bias) - Machine learning bias is a phenomenon that occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions in the machine learning process.
  • machine learning engineer (ML engineer) - A machine learning engineer (ML engineer) is a person who focuses on researching, building and designing self-running AI systems that automate predictive models.
  • machine learning operations (MLOps) - Machine learning operations (MLOps) is the integration of development/operations (DevOps) and machine learning.
  • machine teaching - Machine teaching is the emerging practice of infusing context -- and often business consequences -- into the selection of training data used in artificial intelligence (AI) machine learning so that the most relevant outputs are produced by the machine learning algorithms.
  • machine vision - Machine vision is the ability of a computer to see; it employs one or more video cameras, analog-to-digital conversion (ADC) and digital signal processing (DSP).
  • machine-generated data (MGD) - Machine-generated data (MGD) is information that is produced by mechanical or digital devices.
  • machine-human collaboration - Machine-human collaboration is a model in which humans co-work with artificial intelligence (AI) systems and other machines rather than using them as tools.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • Macintosh - The Macintosh (often called "the Mac") was the first widely-sold personal computer with a graphical user interface (GUI) and a mouse.
  • macOS - MacOS is the computer operating system for Apple desktops and laptops.
  • MACRA (Medicare Access and CHIP Reauthorization Act of 2015) - MACRA (Medicare Access and CHIP Reauthorization Act of 2015) is U.
  • macro - In Microsoft Word and other programs, a macro is a saved sequence of commands or keyboard strokes that can be stored and then recalled with a single command or keyboard stroke.
  • macro virus - A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.
  • macrotrend - A macrotrend is a pervasive and persistent shift in the direction of some phenomenon on a global level.
  • madware - Madware is a type of aggressive advertising that affects smartphones and tablets.
  • magnetic field strength - Magnetic field strength is one of two ways that the intensity of a magnetic field can be expressed.
  • magnetic storage - Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World.
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • magnetic tape storage - Magnetic tape is one of the oldest technologies for electronic data storage.
  • magnetomotive force (magnetic potential) - Magnetomotive force, also known as magnetic potential, is the property of certain substances or phenomena that gives rise to magnetic field s.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • mainframe (big iron) - A mainframe (also known as 'big iron') is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer.
  • Maintenance Management Information System (MMIS) - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • Major IT players: How'd they start out? - Think you're a Know-IT-All when it comes to influential people in IT? Test your knowledge and see if you know what these famous geeks were doing before they made it in the big leagues.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malvertisement (malicious advertisement or malvertising) - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malware - Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
  • Malware Analysis Report (MAR) - Malware Analysis Report (MAR) is a document that relates the functionality and effects of a given piece of malware.
  • Malware quiz: Test your knowledge of types and terms - Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today.
  • Malwarebytes software - Malwarebytes is a cross-platform anti-malware program that detects and removes malware and other rogue software.
  • man in the browser (MitB) - Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is capable of modifying that user's web transactions.
  • man-in-the-disk (MITD) attack - Man-in-the-disk (MITD) is an attack vector that allows an intruder to intercept and potentially alter data as it moves between Android external storage and an installed app.
  • man-in-the-middle attack (MitM) - A man-in-the-middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed mobility services (MMS) - Managed mobility services (MMS) is the procurement, deployment and management of mobile devices and apps, PC software and services connecting out-of-office workers to the enterprise environment.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that sells security services to businesses.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • managed storage - Managed storage is the process of offloading an organization’s data storage requirements to an outside managed service provider.
  • Management and Operations (M&O) Stamp of Approval - The Management and Operations (M&O) Stamp of Approval from the Uptime Institute is a certification of the critical facilities and management operations procedures of a data center.
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • mantrap (interlocking door controller) - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • manufacturer's suggested retail price (MSRP) - Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores.
  • Manufacturing 2.0 - Manufacturing 2.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • Manufacturing operation management (MOM) - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • manufacturing process management (MPM) - Manufacturing process management (MPM) is the discipline of defining how products are manufactured so production processes can be made more efficient and responsive.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI over HTTP (Messaging Application Programming Interface over HTTP) - MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.
  • MapR - MapR Technologies is a distributed data platform for AI and analytics provider that enables enterprises to apply data modeling to their business processes with the goal of increasing revenue, reducing costs and mitigating risks.
  • MapReduce - MapReduce is a core component of the Apache Hadoop software framework.
  • marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • margin of safety (MoS) - In statistics, the margin of error is a measure of the random variation in a survey's results.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market culture - A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees.
  • market development funds (MDF) - Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.
  • market intelligence (MI) - Market intelligence is the monitoring of specific data streams in order to provide stakeholders with a holistic view of an industry segment or customer base.
  • market leadership - Market leadership is when an individual or company owns the largest market share or highest profitability margin in a given market for goods and services.
  • market segmentation - Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share into smaller groups.
  • marketecture (or marchitecture) - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.
  • marketing analytics - Marketing Analytics is the act of tracking, collecting and analyzing data to evaluate marketing effectiveness and guiding future marketing decisions.
  • marketing attribution models - A marketing attribution model is a method for determining which touchpoints are responsible for a sale, as well as how much credit each touchpoint receives.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • marketing campaign management - Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.
  • marketing stack - A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, analyze and improve their services.
  • marketing-qualified lead (MQL) - A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate that he is likely to become a customer.
  • Marketo - Marketo is a platform for the automation of marketing activities; the platform is designed for medium-sized businesses.
  • Marketo Certified Associate - A Marketo Certified Associate (MCA) is a person certified by Marketo to have the necessary skills to set up basic email marketing initiatives and report on program success.
  • Markov model - A Markov model is a stochastic method for randomly changing systems that possess the Markov property.
  • markup - Markup refers to the sequence of characters or other symbols that you insert at certain places in a text or word processing file to indicate how the file should look when it is printed or displayed or to describe the document's logical structure.
  • martech (marketing technology) - Martech is the area of customer relationship management (CRM) concerned with creating, managing and using digital tools that make it possible for marketers to automate tasks and make data-driven decisions.
  • Martian address (Martian packet) - A Martian address is a source or destination IP address that apparently does not exist on Planet Earth and is, thus, invalid and/or non-routable.
  • Maslow’s hierarchy of needs - Maslow’s hierarchy of needs is a charted set of human requirements that are important for an individual to achieve complete development and self-actualization.
  • mass (m) - Mass (symbolized m) is a dimensionless quantity representing the amount of matter in a particle or object.
SearchNetworking
  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close