Browse Definitions :

Browse Definitions by Alphabet

ACT - MAR

  • Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • M.2 SSD - An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage expansion cards.
  • M2M economy (machine-to-machine economy) - A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts.
  • MAC address (Media Access Control address) - In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number.
  • MacBook Air - MacBook Air is a thin, lightweight laptop from Apple.
  • machine authentication - Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.
  • machine behavior - Machine behavior is an emerging field of study that explores the ways that intelligent agents behave, similarly to the way that many scientific disciplines explore the behavior of humans.
  • machine code (machine language) - Machine code, also known as machine language, is the elemental language of computers.
  • machine data - Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
  • machine learning - Machine learning (ML) is a type of artificial intelligence (AI) that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
  • machine learning algorithm - A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.
  • machine learning bias (AI bias) - Machine learning bias is a phenomenon that occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions in the machine learning process.
  • machine learning engineer (ML engineer) - A machine learning engineer (ML engineer) is a person who focuses on researching, building and designing self-running AI systems that automate predictive models.
  • machine learning operations (MLOps) - Machine learning operations (MLOps) is the integration of development/operations (DevOps) and machine learning.
  • machine teaching - Machine teaching is the emerging practice of infusing context -- and often business consequences -- into the selection of training data used in artificial intelligence (AI) machine learning so that the most relevant outputs are produced by the machine learning algorithms.
  • machine vision (computer vision) - Machine vision, which is the ability of a computer to see, employs one or more video cameras, analog-to-digital conversion (ADC) and digital signal processing (DSP).
  • machine-generated data (MGD) - Machine-generated data (MGD) is information that is produced by mechanical or digital devices.
  • machine-human collaboration - Machine-human collaboration is a model in which humans co-work with artificial intelligence (AI) systems and other machines rather than using them as tools.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • Macintosh - The Macintosh (often called "the Mac") was the first widely-sold personal computer with a graphical user interface (GUI) and a mouse.
  • macOS - MacOS is the computer operating system for Apple desktops and laptops.
  • MACRA (Medicare Access and CHIP Reauthorization Act of 2015) - MACRA (Medicare Access and CHIP Reauthorization Act of 2015) is U.
  • macro - In Microsoft Word and other programs, a macro is a saved sequence of commands or keyboard strokes that can be stored and then recalled with a single command or keyboard stroke.
  • macro virus - A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.
  • macromarketing - Macromarketing is the influence that marketing policies and strategies have on the economy and society as a whole.
  • macrotrend - A macro trend is a persistent shift in the direction of some phenomenon on a global level.
  • madware - Madware is a type of aggressive advertising that affects smartphones and tablets.
  • magnetic field strength - Magnetic field strength is one of two ways that the intensity of a magnetic field can be expressed.
  • magnetic storage - Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World.
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • magnetic tape storage - Magnetic tape is one of the oldest technologies for electronic data storage.
  • magnetomotive force (magnetic potential) - Magnetomotive force, also known as magnetic potential, is the property of certain substances or phenomena that gives rise to magnetic field s.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • mainframe (big iron) - A mainframe (also known as 'big iron') is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer.
  • Maintenance Management Information System (MMIS) - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malvertisement (malicious advertisement or malvertising) - A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer's computer with malware.
  • malware - Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
  • Malware Analysis Report (MAR) - Malware Analysis Report (MAR) is a document that relates the functionality and effects of a given piece of malware.
  • Malware quiz: Test your knowledge of types and terms - Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today.
  • malware testing - Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications.
  • Malwarebytes software - Malwarebytes is a cross-platform anti-malware program that detects and removes malware and other rogue software.
  • man in the browser (MitB) - Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is capable of modifying that user's web transactions.
  • man-in-the-disk (MITD) attack - Man-in-the-disk (MITD) is an attack vector that allows an intruder to intercept and potentially alter data as it moves between Android external storage and an installed app.
  • man-in-the-middle attack (MitM) - A man-in-the-middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed mobility services (MMS) - Managed mobility services (MMS) is the procurement, deployment and management of mobile devices and apps, PC software and services connecting out-of-office workers to the enterprise environment.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed print services (MPS) - Managed print services (MPS) is the provision and oversight of business document output needs by an external service provider.
  • managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that sells security services to businesses.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • managed storage - Managed storage is the process of offloading an organization’s data storage requirements to an outside managed service provider.
  • Management and Operations (M&O) Stamp of Approval - The Management and Operations (M&O) Stamp of Approval from the Uptime Institute is a certification of the critical facilities and management operations procedures of a data center.
  • management by objective (MBO) - Management by objective (MBO) is a model in which employees and their managers collaboratively develop, define and explicitly agree to objectives.
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • manipulative design - Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.
  • mantrap (interlocking door controller) - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
  • manufacturer's suggested retail price (MSRP) - Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores.
  • Manufacturing 2.0 - Manufacturing 2.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • manufacturing intelligence software - Enterprise manufacturing intelligence software is a suite of software applications that integrates a company's manufacturing data from multiple sources to aid in reporting, analysis, visual summaries and passing data between enterprise-level and plant-floor systems.
  • Manufacturing operation management (MOM) - Manufacturing operation management (MOM) is an approach of overseeing all aspects of the manufacturing process with a particular focus to increase efficiency.
  • manufacturing process management (MPM) - Manufacturing process management (MPM) is the discipline of defining how products are manufactured so production processes can be made more efficient and responsive.
  • Manufacturing resource planning (MRP II) - Manufacturing resource planning (MRP II) is an integrated method of operational and financial planning for manufacturing companies.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI over HTTP (Messaging Application Programming Interface over HTTP) - MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.
  • MapR - MapR Technologies is a distributed data platform for AI and analytics provider that enables enterprises to apply data modeling to their business processes with the goal of increasing revenue, reducing costs and mitigating risks.
  • MapReduce - MapReduce is a core component of the Apache Hadoop software framework.
  • marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an abbreviation for "marketing communications.
  • margin of safety (MoS) - In statistics, the margin of error is a measure of the random variation in a survey's results.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market culture - A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees.
  • market development funds (MDF) - Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.
  • market distortion - Market distortion is the lack of free and open competition in a market, whether through intentional actions or prevailing market conditions.
  • market intelligence (MI) - Market intelligence is the monitoring of specific data streams in order to provide stakeholders with a holistic view of an industry segment or customer base.
  • market intelligence manager - A market intelligence manager is a corporate employee who studies a given market, makes recommendations as to actions to capitalize on opportunities and helps direct strategy to assist the company in reaching its revenue targets.
  • market leadership - Market leadership is when an individual or company owns the largest market share or highest profitability margin in a given market for goods and services.
  • market segmentation - Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share into smaller groups.
  • market validation - Market validation is a series of actions that an entrepreneur carries out early in the product development lifecycle to verify there is a need for the new product or service in question.
  • marketecture (or marchitecture) - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.
  • marketing analytics - Marketing Analytics is the act of tracking, collecting and analyzing data to evaluate marketing effectiveness and guiding future marketing decisions.
  • marketing attribution models - A marketing attribution model is a method for determining which touchpoints are responsible for a sale, as well as how much credit each touchpoint receives.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • marketing campaign management - Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.
  • marketing information system (MkIS) - A marketing information system (MkIS) is a set of procedures and tools for the continuous gathering of information that might affect the promotion and selling of a product or service.
  • marketing stack - A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, analyze and improve their services.
  • marketing-qualified lead (MQL) - A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate that he is likely to become a customer.
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close