Browse Definitions :

Browse Definitions by Alphabet

  • Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database.
  • m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
  • M.2 SSD - An M.2 SSD is a small form factor solid-state drive (SSD) that internally mounted storage expansion cards use.
  • MAC address (media access control address) - A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.
  • MacBook Air - MacBook Air is a thin, lightweight laptop from Apple.
  • machine authentication - Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.
  • machine code (machine language) - Machine code, also known as machine language, is the elemental language of computers.
  • machine learning algorithm - A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.
  • machine learning bias (AI bias) - Machine learning bias, also sometimes called algorithm bias or AI bias, is a phenomenon that occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions in the machine learning process.
  • machine learning engineer (ML engineer) - A machine learning engineer (ML engineer) is a person in IT who focuses on researching, building and designing self-running artificial intelligence (AI) systems to automate predictive models.
  • machine learning operations (MLOps) - Machine learning operations (MLOps) is the development and use of machine learning models by development operations (DevOps) teams.
  • machine teaching - Machine teaching is the practice of infusing context -- and often business consequences -- into the selection of training data used in machine learning (ML) so that the most relevant outputs are produced by the ML algorithms.
  • machine translation - Machine translation technology enables the conversion of text or speech from one language to another using computer algorithms.
  • machine vision - Machine vision is the ability of a computer to see; it employs one or more video cameras, analog-to-digital conversion and digital signal processing.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • Macintosh - The Macintosh, now called the Mac, was the first widely sold personal computer (PC) with a graphical user interface (GUI) and a mouse.
  • macOS - MacOS is the computer operating system for Apple desktops and laptops.
  • MACRA (Medicare Access and CHIP Reauthorization Act of 2015) - MACRA (Medicare Access and CHIP Reauthorization Act of 2015) is U.
  • macro virus - A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.
  • macrotrend - A macrotrend is a pervasive and persistent shift in the direction of some phenomenon on a global level.
  • magnetic field strength - Magnetic field strength is a measure of the intensity of a magnetic field in a given area of that field.
  • magnetic storage - Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World.
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • magnetic tape storage - Magnetic tape is one of the oldest technologies for electronic data storage.
  • magnetomotive force (magnetic potential) - Magnetomotive force, also known as magnetic potential, is the property of certain substances or phenomena that gives rise to magnetic field s.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • mainframe (big iron) - A mainframe (also known as 'big iron') is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • malware - Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.
  • Malware quiz: Test your knowledge of types and terms - Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today.
  • man in the browser (MitB) - Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is capable of modifying that user's web transactions.
  • man-in-the-middle attack (MitM) - A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed IT service - A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed security service provider (MSSP) - A managed security service provider (MSSP) is an IT service provider that sells security services to businesses.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • management information systems (MIS) - Management information systems (MIS) is a department within an enterprise responsible for controlling the hardware and software systems that the organization uses to make business-critical decisions.
  • manager self-service - Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.
  • managerial grid model (The Blake and Mouton Managerial Grid model) - The managerial grid model was developed by Robert R.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which a data bit's state -- 0 or 1 -- is represented by the transition from one voltage level to another.
  • mandatory access control (MAC) - Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system.
  • Mandela Effect - The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.
  • manufacturing execution system (MES) - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • marcom (or marcomm) - Marcom (sometimes spelled 'marcomm') is an abbreviation for 'marketing communications.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • market concentration - Market concentration is the distribution of a given market among the participating companies.
  • market development funds (MDF) - Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.
  • market segmentation - Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share into smaller groups.
  • marketecture (marchitecture) - Marketecture (also known as marchitecture) refers to non-technical descriptions of a company's products or services that let various stakeholders understand the product's core functionality and how it works with other products as part of a broader ecosystem.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • marketing campaign management - Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.
  • marketing stack - A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, analyze and improve their services.
  • marketing-qualified lead (MQL) - A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate they are likely to become a customer.
  • Marketo - Marketo is a comprehensive marketing software-as-a-service platform designed to automate and streamline marketing tasks across multiple digital channels.
  • Markov model - A Markov model is a stochastic method for randomly changing systems that possess the Markov property.
  • martech (marketing technology) - Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline and enhance marketing efforts.
  • Martian address (Martian packet) - A Martian address is a source or destination IP address that apparently does not exist on Planet Earth and is, thus, invalid and/or non-routable.
  • Maslow’s hierarchy of needs - Maslow’s hierarchy of needs is a charted set of human requirements that are important for an individual to achieve complete development and self-actualization.
  • mass (m) - Mass (symbolized m) is a dimensionless quantity representing the amount of matter in a particle or object.
  • Massachusetts data protection law - What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents.
  • massive open online course (MOOC) - A massive open online course (MOOC) is a typically free web-based distance learning program that's designed for large numbers of geographically dispersed students.
  • Master Boot Record (MBR) - The Master Boot Record (MBR) is the information in the first sector of a hard disk or a removable drive.
  • master data - Master data is the core data that is essential to operations in a specific business or business unit.
  • master data management (MDM) - Master data management (MDM) is a process that creates a uniform set of data on customers, products, suppliers and other business entities from different IT systems.
  • material requirements planning (MRP) - Material requirements planning (MRP) is a system for calculating the materials and components needed to manufacture a product.
  • Mathematical symbols - This table contains mathematical symbols and links to definitions of what they represent and how they are used.
  • matter - Matter is a substance made up of various types of particles that occupies physical space and has inertia.
  • maturity grid (maturity model) - A maturity model is a matrix for evaluating an organization's level of progress towards a goal.
  • Maven - Maven is a project management build tool used mostly in Java development.
  • maximizer - A maximizer is an individual who consistently seeks the optimal outcome for any endeavor.
  • maximum segment size (MSS) - The maximum segment size (MSS) is the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.
  • maximum transmission unit (MTU) - The maximum transmission unit (MTU) is the largest size frame or packet -- in bytes or octets (eight-bit bytes) -- that can be transmitted across a data link.
  • MCITP (Microsoft Certified IT Professional) - An MCITP (Microsoft Certified IT Professional) is a credential that proves that an individual has a complete set of skills required to perform a particular IT job role, such as enterprise or virtualization administrator.
  • McKesson Corp. - McKesson Corp.
  • MCSA (Microsoft Certified Solutions Associate) - MCSA (Microsoft Certified Solutions Associate) was a certification program offered by Microsoft and intended for people seeking entry-level jobs in an IT environment.
  • MD5 - The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.
  • MDI/MDIX (medium-dependent interface/MDI crossover) - MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.
  • mean time to detect (MTTD) - Mean time to detect (MTTD) is a measure of how long a problem exists in an IT deployment before the appropriate parties become aware of it.
  • mean time to innocence - Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.
  • Meaningful Use - In the context of health IT, meaningful use is a term used to define minimum U.
  • meaningful use stage 3 - Meaningful use stage 3 is the third phase of the federal incentive program that details requirements for the use of electronic health record systems by hospitals and eligible healthcare professionals.
  • mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in computer data storage.
  • mechanical refrigeration - Mechanical refrigeration, often referred to simply as refrigeration or air conditioning, is a process by which heat is removed from a location using a human-made heat exchange system.
  • medical imaging (radiology) - Medical imaging, also known as radiology, is the field of medicine in which medical professionals recreate various images of parts of the body for diagnostic or treatment purposes.
  • medical scribe - A medical scribe is a professional who specializes in documenting patient encounters in real time under the direction of a physician.
  • medical transcription (MT) - Medical transcription (MT) is the manual processing of voice reports dictated by physicians and other healthcare professionals into text format.
  • Meditech (Medical Information Technology Inc.) - Meditech (Medical Information Technology Inc.
  • meet-in-the-middle attack - Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • megabyte (MB) - A megabyte is a unit of data capacity that is equal to 1,000,000 bytes in decimal notation (base 10) or 1,048,576 bytes in binary notation (base 2).
  • megabytes per second (MBps) - Megabytes per second (MBps) is a unit of measurement for data transfer speed to and from a computer storage device.
  • megahertz (MHz) - Megahertz (MHz) is a unit multiplier that represents one million hertz (106 Hz).
  • Melissa virus - Melissa was a type of email virus that initially become an issue in early 1999.
  • memorandum of understanding (MOU) - A memorandum of understanding (MOU) is a formal agreement that outlines plans for a common line of action between two or more parties.
  • memory - Memory is the electronic holding place for the instructions and data a computer needs to reach quickly.
  • memory dump - A memory dump is the process of taking all information content in RAM and writing it to a storage drive as a memory dump file (*.
Networking
  • What is wavelength?

    Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated ...

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • What is exposure management?

    Exposure management is a cybersecurity approach to protecting exploitable IT assets.

  • intrusion detection system (IDS)

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • What is a startup company?

    A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or ...

  • What is a CEO (chief executive officer)?

    A chief executive officer (CEO) is the highest-ranking position in an organization and responsible for implementing plans and ...

  • What is labor arbitrage?

    Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • What is the law of diminishing returns?

    The law of diminishing returns is an economic principle stating that as investment in a particular area increases, the rate of ...

  • What is an abandoned call?

    An abandoned call is a call or other type of contact initiated to a call center or contact center that is ended before any ...

  • What is an outbound call?

    An outbound call is one initiated by a contact center agent to prospective customers and focuses on sales, lead generation, ...

Close