Browse Definitions :

Browse Definitions by Alphabet

MEA - MIC

  • meaningful use stage 2 - Meaningful use stage 2 is the second phase of the meaningful use incentive program that details the second phase of requirements for the use of electronic health record (EHR) systems by hospitals and eligible health care providers.
  • meaningful use stage 3 - Meaningful use stage 3 is the third phase of the federal incentive program that details requirements for the use of electronic health record systems by hospitals and eligible healthcare professionals.
  • mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in computer data storage.
  • mechanical refrigeration - Mechanical refrigeration, often referred to simply as refrigeration or air conditioning, is a process by which heat is removed from a location using a human-made heat exchange system.
  • mechatronics - Mechatronics is a branch of engineering that focuses on designing, manufacturing and maintaining products that have both mechanical and electronic components.
  • medical imaging (radiology) - Medical imaging, also known as radiology, is the field of medicine in which medical professionals recreate various images of parts of the body for diagnostic or treatment purposes.
  • medical scribe - A medical scribe is a healthcare employee that assists medical professionals with documenting patients' medical histories.
  • medical transcription (MT) - Medical transcription (MT) is the manual processing of voice reports dictated by physicians and other healthcare professionals into text format.
  • Meditech (Medical Information Technology Inc.) - Meditech (Medical Information Technology Inc.
  • meet-in-the-middle attack - Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • megabyte (MB) - As a measure of computer processor storage and real and virtual memory, a megabyte (abbreviated MB) is 2 to the 20th power bytes, or 1,048,576 bytes in decimal notation.
  • megabytes per second (MBps) - Megabytes per second (MBps) is a unit of measurement for data transfer speed to and from a computer storage device.
  • megahertz (MHz) - The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz).
  • Melissa virus - Melissa was a type of email virus that initially become an issue in early 1999.
  • memorandum of understanding (MOU) - A memorandum of understanding (MOU) is a formal agreement that outlines plans for a common line of action between two or more parties.
  • memory - Memory is the electronic holding place for the instructions and data a computer needs to reach quickly.
  • memory dump - A memory dump is the process of taking all information content in RAM and writing it to a storage drive.
  • memory management - Memory management is the process of controlling and coordinating a computer's main memory.
  • memory management unit (MMU) - A memory management unit (MMU) is a computer hardware component that handles all memory and caching operations associated with the processor.
  • memory map - A memory map is a massive table, in effect a database, that comprises complete information about how the memory is structured in a computer system.
  • memory mirroring - Memory mirroring is the division of memory on a server into two channels.
  • memory paging - Memory paging is a memory management technique used to control sharing of memory resources belonging to a computer or virtual machine (VM).
  • memory read error - A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.
  • memristor - A memristor is a type of resistor in which the flow of electrical current in an electronic circuit is determined by the amount of charge that has previously flowed through it.
  • MEMS (micro-electromechanical systems) - A MEMS (micro-electromechanical system) is a miniature machine that has both mechanical and electronic components.
  • menu - A menu is a set of options presented to the user of a computer application to help them find information or execute a function.
  • menu bar - The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.
  • mergers and acquisitions (M&A) - Mergers and acquisitions (M&A) is the area of corporate finances, management and strategy dealing with purchasing and/or joining with other companies.
  • mesh network topology (mesh network) - A mesh network is a network in which devices -- or nodes -- are linked together, branching off other devices or nodes.
  • message authentication code (MAC) - A message authentication code (MAC) is a cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data.
  • message passing interface (MPI) - The message passing interface (MPI) is a standardized means of exchanging messages between multiple computers running a parallel program across distributed memory.
  • messaging security - Messaging security is a subcategory of unified threat management (UTM) focused on securing and protecting an organization’s communication infrastructure.
  • meta description tag - A meta description tag is a snippet of HTML code in a web page header that summarizes the content that's on the web page.
  • metadata - Often referred to as data that describes other data, metadata is structured reference data that helps to sort and identify attributes of the information it describes.
  • metadata management - Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, analyzed and maintained to best effect across an organization.
  • metal-oxide semiconductor field-effect transistor (MOSFET) - The metal-oxide semiconductor field-effect transistor (MOSFET, pronounced MAWS-feht) is the most common type of field-effect transistor (FET).
  • metamorphic and polymorphic malware - Metamorphic and polymorphic malware are two types of malicious software (malware) that can change their code as they propagate through a system.
  • meter per second (m/s or m/sec) - The meter per second (symbolized m/s or m/sec) is the Standard International (SI) unit of linear speed.
  • metered services (pay-per-use) - Metered services (also called pay-per-use) are any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • method - In object-oriented programming, a method is a programmed procedure that is defined as part of a class and included in any object of that class.
  • metropolitan area network (MAN) - A metropolitan area network (MAN) is a computer network that is larger than a single building local area network (LAN) but is located in a single geographic area that is smaller than a wide area network (WAN).
  • mHealth (mobile health) - mHealth (mobile health) is a general term for the use of mobile phones and other wireless technology in medical care.
  • mickey - The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.
  • MICR (magnetic ink character recognition) - MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or originality of checks and other paper documents.
  • micro app - A micro app is a small, mobile application that is designed to perform one, simple task.
  • micro USB - A micro USB is a miniaturized version of the Universal Serial Bus interface developed for connecting compact and mobile devices, such as smartphones, MP3 players, Global Positioning System devices, printers and digital cameras.
  • micro VM (micro virtual machine) - A micro VM (micro virtual machine) is a virtual machine program that serves to isolate an untrusted computing operation from a computer's host operating system.
  • micro-HDMI - Micro-HDMI (HDMI type D) is a miniaturized version of the High Definition Multimedia Interface specification.
  • micro-location - Micro-location is the process of pinpointing a person's placement to within a few inches or feet using various technologies.
  • microblogging - Microblogging is a short blog post designed for quick and typically direct audience interactions.
  • microchip - A microchip -- also called a chip, computer chip or integrated circuit (IC) -- is a unit of integrated circuitry that is manufactured at a microscopic scale using a semiconductor material, such as silicon or, to a lesser degree, germanium.
  • microcomputer - A microcomputer is a complete computer on a smaller scale and is generally a synonym for the more common term, personal computer or PC, a computer designed for an individual.
  • microcontroller (MCU) - A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.
  • microfarad - The microfarad (symbolized µF) is a unit of capacitance, equivalent to 0.
  • microgrid - A microgrid is a small-scale power grid that can operate independently or collaboratively with other small power grids.
  • microlearning (microtraining) - Microlearning is an educational strategy that breaks complex topics down into short-form, stand-alone units of study that can be viewed as many times as necessary, whenever and wherever the learner has the need.
  • Micronaut framework - Micronaut is an open source JVM-based software framework for building lightweight, modular applications and microservices.
  • microphone - A microphone is a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker.
  • microsecond - A microsecond (us or Greek letter mu plus s) is one millionth (10 -6) of a second.
  • microsegmentation - Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled.
  • microserver - A microserver, also known as a server appliance, is a compact, less expensive, modular hardware platform designed to make installation and maintenance simpler than traditional enterprise-class rack servers.
  • microservice architecture (MSA) - A microservice architecture (MSA) is a logical structure for the design of a software program involving loosely-coupled modular components known as microservices.
  • microservices - Microservices, or microservices architecture, is an approach to application development in which a large application is built from modular components or services.
  • Microsoft - Microsoft is the largest vendor of computer software in the world.
  • Microsoft Active Directory Migration Tool (ADMT) - The Microsoft Active Directory Migration Tool (ADMT) is a tool used to move Active Directory objects from one Windows Server Active Directory domain or forest to another.
  • Microsoft Active Directory Rights Management Services (AD Rights Management Services) - Active Directory Rights Management Services (AD RMS) is a security tool that provides a safeguard to prevent unauthorized access to data.
  • Microsoft App-V (Microsoft Application Virtualization) - Microsoft App-V is a tool IT administrators can use to virtualize and stream applications to users from a centrally managed location.
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • Microsoft AzMan (Microsoft Authorization Manager) - Microsoft AzMan (Authorization Manager) is a role-based access and security framework for .
  • Microsoft Azure - Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.
  • Microsoft Azure Active Directory Authentication Library (ADAL) - Microsoft Azure Active Directory Authentication Library (ADAL) is a tool in the .
  • Microsoft Azure Active Directory Connect (Microsoft Azure AD Connect) - Microsoft Azure Active Directory Connect (Microsoft Azure AD Connect) is a tool for connecting on-premises identity infrastructure to Microsoft Azure Active Directory.
  • Microsoft Azure Data Lake - Microsoft Azure Data Lake is a highly scalable public cloud service that allows developers, scientists, business professionals and other Microsoft customers to gain insight from large, complex data sets.
  • Microsoft Azure ExpressRoute - Microsoft Azure ExpressRoute is a service that provides a private connection between an organization's on-premises infrastructure and Microsoft Azure data centers.
  • Microsoft Azure File Service - Microsoft Azure File Service is a service that allows Windows Server admins to access SMB shares in the Azure cloud by setting up file shares in the Azure management console.
  • Microsoft Azure Functions - Azure Functions is the serverless computing service hosted on the Microsoft Azure public cloud.
  • Microsoft Azure Key Vault - Microsoft Azure Key Vault is a cloud-hosted management service that allows users to encrypt keys and small secrets like passwords or answers to security questions that are used in their cloud applications and services.
  • Microsoft Azure Machine Learning - Microsoft Azure Machine Learning is a collection of services and tools intended to help developers train and deploy machine learning models.
  • Microsoft Azure Marketplace - The Microsoft Azure Marketplace is an online store that offers applications and services either built on or designed to integrate with Microsoft's public cloud.
  • Microsoft Azure monitoring tools - Azure monitoring tools are software meant to assist in the different aspects of cloud infrastructure management and monitoring, centering around Microsoft's cloud computing platform, Azure.
  • Microsoft Azure Resource Manager - Microsoft Azure Resource Manager (ARM) is a management framework that allows administrators to deploy, manage and monitor Azure resources.
  • Microsoft Azure Security Center - Microsoft Azure Security Center is a set of tools and services for securing virtual machines that run on the Azure public cloud.
  • Microsoft Azure Stack - Microsoft Azure Stack is an integrated platform of hardware and software that delivers Microsoft Azure public cloud services in a local data center to let organizations construct hybrid clouds.
  • Microsoft Azure VM Scale Sets - A Microsoft Azure VM Scale Set is a group of individual virtual machines (VMs) within the Microsoft Azure public cloud that IT administrators can configure and manage as a single unit.
  • Microsoft Certified Systems Engineer (MCSE) - An MCSE (Microsoft Certified Systems Engineer) is someone who has passed exams about the Microsoft Windows NT operating system, related desktop systems, networking, and Microsoft's BackOffice server products.
  • Microsoft Click-To-Run - Microsoft Click-to-Run is a way to quickly install Microsoft products, including versions of Office 2010 and Office 2013.
  • Microsoft Cloud Witness - Microsoft Cloud Witness is a high availability feature for failover clusters that uses storage in the Microsoft Azure cloud platform to ensure clusters continue to function if there is a site outage.
  • Microsoft Cluster Service (MSCS) - Microsoft Cluster Service (MSCS) is a service that provides high availability (HA) for applications such as databases, messaging and file and print services.
  • Microsoft Connectivity Analyzer (MCA) - The Microsoft Connectivity Analyzer (MCA) is a diagnostics tool for troubleshooting and testing connectivity to several Microsoft messaging products from a client machine on an organization's network.
  • Microsoft Cortana - Cortana is Microsoft's digital assistant.
  • Microsoft D - Microsoft D is an end-user programming language in development as part of the company's Oslo service-oriented architecture (SOA) initiative.
  • Microsoft Dynamic Access Control (DAC) - Microsoft Dynamic Access Control (DAC) is a data governance tool in Windows Server 2012 that lets admins control the permission of access settings in an organization.
  • Microsoft Dynamics 365 - Microsoft Dynamics 365 is a cloud-based business applications platform that combines components of customer relationship management (CRM) and enterprise resource planning (ERP), along with productivity applications and artificial intelligence tools.
  • Microsoft Edge - Microsoft Edge is the browser for Windows 10; Edge replaces Internet Explorer, the browser that debuted with Windows 95 and was a part of Windows operating systems for the following two decades.
  • Microsoft Endpoint Manager (MEM) - Microsoft Endpoint Manager (MEM) is a cloud-based solution that is designed to address the challenges associated with deploying, managing and securing devices in the enterprise.
  • Microsoft Exchange Control Panel - The Exchange Control Panel (ECP) is a Web-based management interface introduced in Exchange Server 2010.
  • Microsoft Exchange Global Address List (GAL) - The Microsoft Exchange Global Address List is a list of all users and their respective email addresses within an Exchange Server organization that uses Microsoft Outlook for email.
  • Microsoft Exchange In-Place eDiscovery - Microsoft Exchange In-Place eDiscovery is an administrative feature to perform legal discovery searches for relevant content in mailboxes.
  • Microsoft Exchange Mailbox Replication Service (MRS) - The Microsoft Exchange Mailbox Replication Service (MRS) is a feature that handles mailbox import, export, migration and restoration requests on Exchange Server.
Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close