Browse Definitions :

Browse Definitions by Alphabet

  • Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • M.2 SSD - An M.2 SSD is a small form factor solid-state drive (SSD) that internally mounted storage expansion cards use.
  • MAC address (media access control address) - A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.
  • MacBook Air - MacBook Air is a thin, lightweight laptop from Apple.
  • machine authentication - Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.
  • machine code (machine language) - Machine code, also known as machine language, is the elemental language of computers.
  • machine learning algorithm - A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.
  • machine learning bias (AI bias) - Machine learning bias, also sometimes called algorithm bias or AI bias, is a phenomenon that occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions in the machine learning process.
  • machine learning engineer (ML engineer) - A machine learning engineer (ML engineer) is a person in IT who focuses on researching, building and designing self-running artificial intelligence (AI) systems to automate predictive models.
  • machine learning operations (MLOps) - Machine learning operations (MLOps) is the development and use of machine learning models by development operations (DevOps) teams.
  • machine teaching - Machine teaching is the practice of infusing context -- and often business consequences -- into the selection of training data used in machine learning (ML) so that the most relevant outputs are produced by the ML algorithms.
  • machine translation - Machine translation technology enables the conversion of text or speech from one language to another using computer algorithms.
  • machine vision - Machine vision is the ability of a computer to see; it employs one or more video cameras, analog-to-digital conversion and digital signal processing.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • Macintosh - The Macintosh, now called the Mac, was the first widely sold personal computer (PC) with a graphical user interface (GUI) and a mouse.
  • macOS - MacOS is the computer operating system for Apple desktops and laptops.
  • MACRA (Medicare Access and CHIP Reauthorization Act of 2015) - MACRA (Medicare Access and CHIP Reauthorization Act of 2015) is U.
  • macro virus - A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.
  • macrotrend - A macrotrend is a pervasive and persistent shift in the direction of some phenomenon on a global level.
  • magnetic field strength - Magnetic field strength is a measure of the intensity of a magnetic field in a given area of that field.
  • magnetic storage - Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World.
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • magnetic tape storage - Magnetic tape is one of the oldest technologies for electronic data storage.
  • magnetomotive force (magnetic potential) - Magnetomotive force, also known as magnetic potential, is the property of certain substances or phenomena that gives rise to magnetic field s.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • mainframe (big iron) - A mainframe (also known as 'big iron') is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malware - Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
  • Malware quiz: Test your knowledge of types and terms - Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today.
  • man in the browser (MitB) - Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is capable of modifying that user's web transactions.
  • man-in-the-middle attack (MitM) - A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that sells security services to businesses.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • management information systems (MIS) - Management information systems (MIS) is a department within an enterprise responsible for controlling the hardware and software systems that the organization uses to make business-critical decisions.
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which a data bit's state -- 0 or 1 -- is represented by the transition from one voltage level to another.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • MapReduce - MapReduce is a core component of the Apache Hadoop software framework.
  • marcom (or marcomm) - Marcom (sometimes spelled 'marcomm') is an abbreviation for 'marketing communications.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market development funds (MDF) - Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.
  • market segmentation - Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share into smaller groups.
  • marketecture (marchitecture) - Marketecture (also known as marchitecture) refers to non-technical descriptions of a company's products or services that let various stakeholders understand the product's core functionality and how it works with other products as part of a broader ecosystem.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • marketing campaign management - Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.
  • marketing stack - A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, analyze and improve their services.
  • marketing-qualified lead (MQL) - A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate they are likely to become a customer.
  • Marketo - Marketo is a platform for the automation of marketing activities; the platform is designed for medium-sized businesses.
  • Markov model - A Markov model is a stochastic method for randomly changing systems that possess the Markov property.
  • martech (marketing technology) - Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline and enhance marketing efforts.
  • Martian address (Martian packet) - A Martian address is a source or destination IP address that apparently does not exist on Planet Earth and is, thus, invalid and/or non-routable.
  • masked language models (MLMs) - Masked language models (MLMs) are used in natural language processing (NLP) tasks for training language models.
  • Maslow’s hierarchy of needs - Maslow’s hierarchy of needs is a charted set of human requirements that are important for an individual to achieve complete development and self-actualization.
  • mass (m) - Mass (symbolized m) is a dimensionless quantity representing the amount of matter in a particle or object.
  • Massachusetts data protection law - What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents.
  • massive open online course (MOOC) - A massive open online course (MOOC) is a typically free web-based distance learning program that's designed for large numbers of geographically dispersed students.
  • Master Boot Record (MBR) - The Master Boot Record (MBR) is the information in the first sector of a hard disk or a removable drive.
  • master data - Master data is the core data that is essential to operations in a specific business or business unit.
  • master data management (MDM) - Master data management (MDM) is a process that creates a uniform set of data on customers, products, suppliers and other business entities from different IT systems.
  • material requirements planning (MRP) - Material requirements planning (MRP) is a system for calculating the materials and components needed to manufacture a product.
  • Mathematical symbols - This table contains mathematical symbols and links to definitions of what they represent and how they are used.
  • matter - Matter is a substance made up of various types of particles that occupies physical space and has inertia.
  • maturity grid (maturity model) - A maturity model is a matrix for evaluating an organization's level of progress towards a goal.
  • Maven - Maven is a project management build tool used mostly in Java development.
  • maximizer - A maximizer is an individual who consistently seeks the optimal outcome for any endeavor.
  • maximum segment size (MSS) - The maximum segment size (MSS) is the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.
  • maximum transmission unit (MTU) - The maximum transmission unit (MTU) is the largest size frame or packet -- in bytes or octets (eight-bit bytes) -- that can be transmitted across a data link.
  • MCITP (Microsoft Certified IT Professional) - An MCITP (Microsoft Certified IT Professional) is a credential that proves that an individual has a complete set of skills required to perform a particular IT job role, such as enterprise or virtualization administrator.
  • McKesson Corp. - McKesson Corp.
  • MCSA (Microsoft Certified Solutions Associate) - MCSA (Microsoft Certified Solutions Associate) was a certification program offered by Microsoft and intended for people seeking entry-level jobs in an IT environment.
  • MD5 - The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.
  • MDI/MDIX (medium-dependent interface/MDI crossover) - MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.
  • mean time to detect (MTTD) - Mean time to detect (MTTD) is a measure of how long a problem exists in an IT deployment before the appropriate parties become aware of it.
  • mean time to innocence - Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.
  • Meaningful Use - In the context of health IT, meaningful use is a term used to define minimum U.
  • meaningful use stage 3 - Meaningful use stage 3 is the third phase of the federal incentive program that details requirements for the use of electronic health record systems by hospitals and eligible healthcare professionals.
  • mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in computer data storage.
  • mechanical refrigeration - Mechanical refrigeration, often referred to simply as refrigeration or air conditioning, is a process by which heat is removed from a location using a human-made heat exchange system.
  • medical imaging (radiology) - Medical imaging, also known as radiology, is the field of medicine in which medical professionals recreate various images of parts of the body for diagnostic or treatment purposes.
  • medical scribe - A medical scribe is a professional who specializes in documenting patient encounters in real time under the direction of a physician.
  • medical transcription (MT) - Medical transcription (MT) is the manual processing of voice reports dictated by physicians and other healthcare professionals into text format.
  • Meditech (Medical Information Technology Inc.) - Meditech (Medical Information Technology Inc.
  • meet-in-the-middle attack - Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • megabyte (MB) - A megabyte is a unit of data capacity that is equal to 1,000,000 bytes in decimal notation (base 10) or 1,048,576 bytes in binary notation (base 2).
  • megabytes per second (MBps) - Megabytes per second (MBps) is a unit of measurement for data transfer speed to and from a computer storage device.
  • megahertz (MHz) - Megahertz (MHz) is a unit multiplier that represents one million hertz (106 Hz).
  • Melissa virus - Melissa was a type of email virus that initially become an issue in early 1999.
  • memorandum of understanding (MOU) - A memorandum of understanding (MOU) is a formal agreement that outlines plans for a common line of action between two or more parties.
Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close