Browse Definitions :

Browse Definitions by Alphabet

  • Microsoft Schannel (Microsoft Secure Channel) - The Microsoft Secure Channel, or Schannel, is a security support package that facilitates the use of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption on Windows platforms.
  • Microsoft SCOM (System Center Operations Manager) - Microsoft SCOM (System Center Operations Manager) is a set of tools for infrastructure monitoring and application performance management.
  • Microsoft SharePoint - Microsoft SharePoint is a document management and collaboration platform that helps a company manage archives, documents, reports and other content that is vital to its business processes.
  • Microsoft Software Assurance (SA) - Microsoft Software Assurance is a software maintenance program that helps organizations gain access to the latest software versions and releases, without incurring additional licensing costs.
  • Microsoft SQL Server - Microsoft SQL Server is a relational database management system (RDBMS) that supports a wide variety of transaction processing, business intelligence (BI) and data analytics applications in corporate IT environments.
  • Microsoft SQL Server Management Studio (SSMS) - Microsoft SQL Server Management Studio (SSMS) is an integrated environment to manage a SQL Server infrastructure.
  • Microsoft SSIS (SQL Server Integration Services) - Microsoft SSIS (SQL Server Integration Services) is an enterprise data integration, data transformation and data migration tool built into Microsoft's SQL Server database.
  • Microsoft Store - The Microsoft Store -- formerly called the Windows Store -- is an online marketplace for consumers to buy and download a variety of items.
  • Microsoft System Center - Microsoft System Center is a suite of software products designed to simplify the deployment, configuration and management of IT infrastructure and virtualized software-defined data centers.
  • Microsoft System Center 2012 - Microsoft System Center 2012 is a bundled suite of systems management products that offers tools to monitor and automate virtualized environments, including private clouds based on Microsoft Hyper-V.
  • Microsoft System Center Configuration Manager (SCCM) - Microsoft System Center Configuration Manager (SCCM) is a Windows product that enables the management, deployment and security of devices and applications across an enterprise.
  • Microsoft System Center Operations Manager Management Pack (Microsoft SCOM Management Pack) - A System Center Operations Manager (SCOM) Management Pack is a pre-fabricated rule set intended to extend and configure SCOM for specific services or applications.
  • Microsoft Teams - Microsoft Teams is cloud-based team collaboration software that offers core capabilities, including business messaging, calling, video meetings and file sharing.
  • Microsoft Technology Associate (MTA) certification - Microsoft Technology Associate (MTA) certification is the name of a suite of entry-level certifications offered by Microsoft that signify fundamental technology knowledge in those who earn it.
  • Microsoft UE-V (User Experience Virtualization) - Microsoft UE-V (User Experience Virtualization) is a tool that lets users move from one Windows device to another and maintain the same operating system and applications settings.
  • Microsoft USMT (User State Migration Tool) - The Microsoft User State Migration Tool (USMT) is a command-line utility used to transfer user files and settings between computers.
  • Microsoft Visual FoxPro (Microsoft VFP) - Microsoft Visual FoxPro (VFP) is an object-oriented programming environment with a built-in relational database engine.
  • Microsoft Windows 10 Shared PC Mode - Microsoft Windows 10 Shared PC Mode is an operating system feature that allows IT administrators to configure computers for multiple user access.
  • Microsoft Windows Assessment and Deployment Kit (Windows ADK) - The Microsoft Windows Assessment and Deployment Kit is a set of tools IT professionals can combine to prepare, assess and launch image-based Windows deployments.
  • Microsoft Windows Azure Active Directory (Windows Azure AD) - Microsoft Windows Azure Active Directory (Windows Azure AD or Azure AD) is a cloud service that provides administrators with the ability to manage end-user identities and access privileges.
  • Microsoft Windows Background Intelligent Transfer Service (BITS) - Microsoft Windows Background Intelligent Transfer Service (BITS) is a service in Microsoft Windows operating systems (OSes) that allows download from and upload of files to Hypertext Transfer Protocol (HTTP) web servers and Server Message Block (SMB) file servers.
  • Microsoft Windows Credential Guard - Microsoft Credential Guard is a security feature in Microsoft Windows operating system (OS) that isolates user credentials, such as login information, from the rest of the operating system.
  • Microsoft Windows Defender Device Guard - Windows Defender Device Guard is a security feature for Windows 10 and Windows Server designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.
  • Microsoft Windows Deployment Image Servicing and Management (DISM) - Microsoft Windows Deployment Image Servicing and Management (DISM) is a command-line tool that allows IT administrators to service Windows desktop images and virtual hard disks prior to deployment to users.
  • Microsoft Windows Features on Demand - Microsoft Windows Features on Demand is a feature that allows system administrators to add or remove roles and features in Windows 8 and Windows Server 2012, and later versions of the client and server operating system to alter the file size of those operating systems.
  • Microsoft Windows File Explorer - Microsoft Windows File Explorer is a graphical file management utility for the Windows operating system (OS).
  • Microsoft Windows Hello - Microsoft Windows Hello is a biometric identity and access control feature that supports fingerprint scanners, iris scanners and facial recognition technology on compatible devices running Windows.
  • Microsoft Windows Insider Program for Business - Microsoft Windows Insider Program for Business is a service for IT professionals who want to test preview builds of Windows 10 and Windows Server in the enterprise before general availability.
  • Microsoft Windows PowerShell DSC (Desired State Configuration) - Desired State Configuration (DSC) is a feature in PowerShell 4.
  • Microsoft Windows PowerShell Integrated Scripting Environment (ISE) - The Windows PowerShell Integrated Scripting Environment (ISE) is a graphical user interface and front-end hosting application for Windows PowerShell.
  • Microsoft Windows Recovery Environment (Windows RE) - The Microsoft Windows Recovery Environment, or Windows RE, is a simplified, scaled-back version of the Windows operating system that is used to boot the system when Windows 8.
  • Microsoft Windows Server 2016 - Microsoft Windows Server 2016 is Microsoft's server operating system (OS).
  • Microsoft Windows Server LTSC (Long-Term Servicing Channel) - Microsoft Windows Server LTSC (Long-Term Servicing Channel) is a servicing option for Microsoft's server operating system that follows the familiar track of two to three years between feature updates.
  • Microsoft Windows Server OS (operating system) - Microsoft Windows Server OS (operating system) is a series of enterprise-class server operating systems designed to share services with multiple users and provide extensive administrative control of data storage, applications and corporate networks.
  • Microsoft Windows Subsystem for Linux (WSL) - Microsoft Windows Subsystem for Linux (WSL) is a series of Microsoft components that allow native Linux 64-bit Executable and Linkable Format (ELF64) binaries to run on the Windows kernel in the Windows 10 operating system (OS).
  • Microsoft Windows System Image Manager (SIM) - Microsoft Windows System Image Manager (SIM) is a tool in the Windows Assessment and Deployment Kit that IT professionals can use to create and manage unattended setup answer files for Windows before installing the operating system.
  • Microsoft Windows Update - Microsoft Windows Update is a security service for Windows users that, once activated, automatically searches for and installs updates.
  • MicroStrategy - MicroStrategy is an enterprise business intelligence (BI) application and software vendor.
  • microtargeting - Microtargeting (also called micro-niche targeting) is a marketing strategy that uses consumer data and demographics to identify the interests and preferences of specific individuals or small groups to send targeted advertisements that align with their interests.
  • microtrend - A microtrend is a tendency in the direction of some phenomenon that is fairly pervasive within a given sphere of influence and may only last for a few years, or even months.
  • middleware - Middleware is software that bridges the gap between applications and operating systems by providing a method for communication and data management.
  • MIDI (Musical Instrument Digital Interface) - Musical Instrument Digital Interface (MIDI) is a standard to transmit and store music, originally designed for digital music synthesizers.
  • Milgram experiment (Behavioral Study on obedience) - The Milgram experiment is a famous psychological study exploring the willingness of individuals to follow the orders of authorities when those orders conflict with the individual’s own moral judgment.
  • Millennials (Generation Y) - Millennials, also known as Generation Y, is a demographic that includes individuals who reached adulthood around the turn of the 21st century.
  • milliampere-hour (mAh) - A milliampere-hour (mAh) is one-thousandth of an ampere hour (Ah), which can also be written as 1 mAh = 0.
  • millimeter (mm, millimetre) - A millimeter (abbreviated as mm and sometimes spelled as millimetre) is a small unit of length/distance in the metric system, one-thousandth of a meter (which is similar in length to a yard in the Imperial system of measurement).
  • millimeter wave (mmWave) - Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.
  • million instructions per second (MIPS) - Million instructions per second (MIPS) is a measure of a processor's speed, providing a standard for representing the number of instructions that a CPU can process in 1 second.
  • MIME (Multipurpose Internet Mail Extensions) - MIME, or Multipurpose Internet Mail Extensions, is an extension of the original email protocol.
  • mimikatz - Mimikatz is an open source malware program used by hackers and penetration testers to gather credentials on Windows computers.
  • MIMO (multiple input, multiple output) - MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).
  • mind-brain identity theory - Mind-brain identity theory is a philosophy that purports the mind and brain are the same.
  • mindshare (share of mind) - Mindshare, also known as share of mind, is an approach to marketing that involves attempting to make a company, brand or product the first one that comes to mind when a customer thinks of a particular market.
  • Mini-ITX - Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top boxes and network devices.
  • minimum marketable feature (MMF) - A minimum marketable feature (MMF) is the smallest set of functionality in a product that must be provided for a customer to recognize any value.
  • mirror site - A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place.
  • mission-critical application - A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful.
  • MIT License (X11 license or MIT X license) - The MIT License (also known as the X11 license or MITX license) is a software license that was originally developed at the Massachusetts Institute of Technology.
  • Mitre ATT&CK framework - The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyber adversaries to help organizations strengthen their cybersecurity strategies.
  • mixed reality (hybrid reality, extended reality) - Mixed reality (MR) is a user environment in which physical reality and digital content are combined in a way that enables interaction with and among real-world and virtual objects.
  • mnemonic - In general, a mnemonic (from Greek mnemon or mindful; pronounced neh-MAHN-ik) is a memory aid, such as an abbreviation, rhyme or mental image that helps to remember something.
  • mob mentality (herd/hive mentality) - Mob mentality -- also called herd or hive mentality -- is the inclination that some humans have to be part of a large group, often neglecting their individual feelings in the process, and adopting the behaviors and actions of the people around them.
  • mob programming - Mob programming is a collaborative approach to software development in which a group of developers work together in real time on one task.
  • mobile app - A mobile app (or mobile application) is a software application developed specifically for use on small, wireless computing devices, such as smartphones and tablets, rather than desktop or laptop computers.
  • mobile application development - Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.
  • mobile application development platform (MADP) - A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and deploy mobile apps for smartphones or tablets.
  • mobile application management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile authentication - Mobile authentication is the verification of a user's identity via a mobile device using one or more authentication methods for secure access.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile cloud - The mobile cloud is Internet-based data, applications and related services accessed through smartphones, laptop computers, tablets and other portable devices.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • mobile CRM (mobile customer relationship management) - Mobile CRM, or mobile customer relationship management, enables those working in the field or remote employees to use mobile devices, such as smartphones and tablets, to access customer data and customer accounts wherever they are.
  • mobile data - Mobile data is internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection.
  • mobile device - A mobile device is essentially a portable, handheld computer that enables users to access information, perform tasks and connect with other people and devices.
  • mobile device management (MDM) - Mobile device management (MDM) software allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
  • mobile hotspot - A mobile hotspot is a portable hardware device that serves as a wireless access point for connecting devices to the internet.
  • mobile malware - Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.
  • mobile number portability (MNP) - Mobile number portability (MNP) is a service that allows a cellphone or smartphone customer to change service providers and keep the same phone number.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile platform as a service (mPaaS) - Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile robot (mobile robotics) - A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
  • mobile security (wireless security) - Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile UI (mobile user interface) - A mobile UI (mobile user interface) is the graphical and usually touch-sensitive display on a mobile device, such as a smartphone or tablet, that allows the user to interact with the device's apps, features, content and functions.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a reseller of wireless communications services.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • model card in machine learning - A model card is a type of documentation that is created for, and provided with, machine learning models.
  • model of reflection - A model of reflection is a structured process that is used to guide personal and situational analysis and improvement.
  • model-based systems engineering (MBSE) - Model-based systems engineering (MBSE) uses models to share information across collaborators in the design, development, test and operation of complex systems.
  • model-based testing - Model-based testing (MBT) requires a test team to create a second, lightweight implementation of a software build- typically only the business logic - called the model.
  • model-driven development (MDD) - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model-view-controller (MVC) - In programming, model-view-controller (MVC) is an architectural design pattern that organizes an application's logic into distinct layers, each of which carries out a specific set of tasks.
  • Model-View-ViewModel (MVVM) - Model-View-ViewModel (MVVM) is a software design pattern that is structured to separate program logic and user interface controls.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • ModelOps (model operations) - ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
  • modulation - Modulation is the process of converting data into radio waves by adding information to an electronic or optical carrier signal.
  • module - A module is a distinct assembly of components that can be easily added, removed or replaced in a larger system.
  • mole per meter cubed (Avogadro constant) - The mole per meter cubed (mol / m 3) is the International Unit of amount-of-substance concentration.
Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close