Browse Definitions :

Browse Definitions by Alphabet

MOB - MOZ

  • mobile card reader - A mobile card reader, such as Square or PayPal Here, allows the user to accept payments through their mobile devices.
  • mobile cloud - The mobile cloud is Internet-based data, applications and related services accessed through smartphones, laptop computers, tablets and other portable devices.
  • mobile cloud applications - A mobile cloud application is a software program that is designed to be accessed over the Internet by many types of portable computing devices.
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • mobile content management - Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices.
  • mobile CRM (mobile customer relationship management) - Mobile CRM, or mobile customer relationship management, enables those working in the field or remote employees to use mobile devices, such as smartphones and tablets, to access customer data and customer accounts wherever they are.
  • mobile data - Mobile data is internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection.
  • mobile desktop virtualization - Mobile desktop virtualization is the delivery of a virtual machine (VM) image that runs business applications to a tablet or smartphone.
  • mobile device - A mobile device is essentially a handheld computer.
  • mobile device attack - A mobile device attack is an exploit targeting handheld communications devices, such as smartphones and tablets.
  • mobile device fragmentation - Mobile device fragmentation is a phenomenon that occurs when some mobile users are running older versions of an operating system, while other users are running newer versions.
  • mobile device management (MDM) - Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
  • mobile device management software - Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.
  • mobile enterprise application platform (MEAP) - A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.
  • mobile experience - Mobile experience, or mobile user experience (UX), is the practice of fostering a certain user perception before, during and after the interaction with a mobile product or offering.
  • mobile first - Mobile first is an approach to business process and technology that assumes smartphones, tablets and task-specific apps are employees' primary tools for getting work done.
  • mobile hotspot - A mobile hotspot is an ad hoc wireless access point that is created by a dedicated hardware device or a smartphone feature that shares the phone's cellular data.
  • mobile information management (MIM) - Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.
  • mobile Internet device (MID) - The mobile Internet device (MID) is a mini-tablet communications unit aimed at the consumer market and designed to provide entertainment, information and location-based services.
  • Mobile IP - Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address.
  • Mobile IPv6 (MIPv6 or Mobile Internet Protocol version 6) - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • mobile IT (mobile information technology) - Mobile IT (mobile information technology) is the ability of IT departments to deliver enterprise information technology solutions to employees working anywhere on any device.
  • mobile malware - Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.
  • mobile marketing - Mobile marketing is promotional activity designed for delivery to cell phones, smart phones and other handheld devices, usually as a component of a multi-channel campaign.
  • mobile middleware - Mobile middleware is software that connects disparate mobile applications, programs and systems.
  • mobile number portability (MNP) - Mobile number portability (MNP) is a service that allows a cellphone or smartphone customer to change service providers and keep the same phone number.
  • mobile number privacy - Mobile number privacy is the protection of the phone user’s number from unwanted access.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile payment (m-payment) - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile platform as a service (mPaaS) - Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile productivity app (mobile productivity application) - A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks.
  • mobile robot (mobile robotics) - A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
  • mobile search - Mobile search is the practice of querying a search engine from an Internet-connected handheld device, such as a smart phone.
  • mobile security (wireless security) - Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • mobile security certification - A mobile security certification is a formalized program that verifies the participant’s competency in tasks related to mobile security and administration.
  • mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • mobile spyware - Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile ticketing - Mobile ticketing is the purchase of admission to events through a mobile device, including the delivery of digital tickets to a smartphone for use in place of traditional paper tickets.
  • mobile UI (mobile user interface) - A mobile UI is the user interface on a mobile device, usually including a touch screen display and all the other elements of the device that allow the user to interact with it.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a services provider in the mobile device industry that provides wireless communications services including voice and data to customers over a wireless network infrastructure owned by a third-party mobile network operator (MNO).
  • mobile virtualization - Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • mobile workstation - A mobile workstation is a notebook computer with high-end computing features not typical of the notebook.
  • mobile-to-mobile convergence (MMC) - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • MobileIron - MobileIron is a company that provides management and security software for mobile apps, content and devices.
  • mobo (motherboard) - Mobo is a short form for motherboard that is sometimes used in Usenet newsgroups and Web forum discussions.
  • mock object - In object-oriented programming, a mock object is a simulated object that mimics the behavior of the smallest testable parts of an application in controlled ways.
  • model of reflection - A model of reflection is a structured process that is used to guide personal and situational analysis and improvement.
  • model-based enterprise - Model-based enterprise (MBE) is an engineering strategy that aims to clarify design intent during the manufacturing process, resulting in better quality of the products, reduced costs and more efficiency.
  • model-based testing - Model-based testing (MBT) requires a test team to create a second, lightweight implementation of a software build- typically only the business logic - called the model.
  • model-driven development (MDD) - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model-view-controller (MVC) - In object-oriented programming development, model-view-controller (MVC) is the name of a methodology or design pattern for successfully and efficiently relating the user interface to underlying data models.
  • Model-View-ViewModel (MVVM) - Model-View-ViewModel (MVVM) is a software design pattern that is structured to separate program logic and user interface controls.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • ModelOps (model operations) - ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
  • modem - A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
  • modem error-correcting protocols - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • modem lights (AA) - This page provides a description of the abbreviations and meanings of each of the lights that describe the "handshaking" between a computer modem and the UART chip in a computer.
  • modular PC - A modular PC is a computer that has individually-housed components, which are interconnected but separately removable for service or upgrading.
  • modulation - Modulation is the process of converting data into radio waves by adding information to an electronic or optical carrier signal.
  • module - A module is a distinct assembly of components that can be easily added, removed or replaced in a larger system.
  • moire effect - Moire effect is a visual perception that occurs when viewing a set of lines or dots that is superimposed on another set of lines or dots, where the sets differ in relative size, angle, or spacing.
  • mole per meter cubed (Avogadro constant) - The mole per meter cubed (mol / m 3) is the International Unit of amount-of-substance concentration.
  • molecular manufacturing - Molecular manufacturing is a branch of nanotechnology that involves the use of nanoscale (extremely small) tools and non-biological processes to build structures, devices, and systems at the molecular level.
  • molecule - A molecule is two or more atoms connected by chemical bonds, which form the smallest unit of a substance that retains the composition and properties of that substance.
  • moment of truth (marketing MOT) - A moment of truth is marketing lingo for any opportunity a customer (or potential customer) has to form an impression about a company, brand, product or service.
  • Monad Manifesto - The Monad Manifesto is a document written by Jeffrey Snover in 2002 that outlined his idea for a new Windows systems administration tool named Monad, which was changed to Windows PowerShell.
  • money laundering - Money laundering is the act of disguising the original ownership, identity and destination of the profits of a crime by hiding it within a legitimate financial institution and making it appear to have been acquired from a legal source.
  • MongoDB - MongoDB is an open source NoSQL database management program.
  • moniker - In general, a moniker is a name or a nickname and, in the simplest terms, that is what it is in computer terminology as well.
  • monolithic - Monolithic, in information technology, means either very large or composed all in one piece, depending on the particular context.
  • monolithic architecture - A monolithic architecture is the traditional unified model for the design of a software program.
  • monostable circuit - A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).
  • monotasking (single-tasking) - Monotasking, also known as single-tasking, is the practice of dedicating oneself to a given task and minimizing potential interruptions until the task is completed or a significant period of time has elapsed.
  • monotonicity - Monotonicity is a property of certain types of digital-to-analog converter (DAC) circuits.
  • monster VM (monster virtual machine) - A monster virtual machine is a virtual machine (VM) that typically has more than eight virtual CPUs (vCPUs) and more than 255 GB of virtual RAM.
  • Monster Worldwide - Monster Worldwide is an online recruiting company noted for its flagship Monster.
  • monthly recurring revenue (MRR) - Monthly recurring revenue (MRR) is income a company can reliably anticipate every 30 days and one of the key metrics for channel partner companies.
  • moonshot - In technology, a moonshot is an ambitious, exploratory and groundbreaking project undertaken without the assurance of near-term profitability or benefit and, perhaps, without a full investigation of potential risks and benefits.
  • Morphis - Morphis is a Java -based open source wireless transcoding platform from Kargo, Inc.
  • morphological analysis - Morphological analysis is the process of examining possible resolutions to unquantifiable, complex problems involving many factors.
  • Morse code - Morse code is a method of sending text messages by keying in a series of electronic pulses, usually represented as a short pulse (called a "dot") and a long pulse (a "dash").
  • MoSCoW method - The MoSCoW method is a four-step approach to prioritizing which project requirements will provide the best return on investment (ROI).
  • most significant bit or byte - The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.
  • motherboard - A motherboard is the main printed circuit board (PCB) in a computer.
  • motherboard tattoo - A motherboard tattoo is a colloquial term once used to denote an ID code that is written in the basic input/output system (BIOS) of a computer to uniquely identify the computer.
  • motion analysis - Motion analysis is a measuring technique used in computer vision, image processing and high-speed photography applications to detect movement.
  • motion capture (mo-cap) - Motion capture (mo-cap) is the use of sensors on real bodies (objects and beings) to track motion and record the movements digitally, typically for transferring to virtual 3D imaging.
  • motion gaming (motion-controlled gaming) - A motion gaming system, sometimes called a motion-controlled gaming system, is one that allows players to interact with the system through body movements.
  • motive power - Motive power is a term in thermodynamics referring to the harnessed energy or force that is used to power a mechanical device or system.
  • motor vehicle record (MVR) - A motor vehicle record (MVR) is the documentation of a person’s driving history.
  • mount - In computers, to mount is to make a group of files in a file system structure accessible to a user or user group.
  • mount point - Whether it comes from a partition on the same drive, a new hard drive, media inserted into an optical drive or some form of flash memory, any file system must be mounted before it can be displayed and its file system read.
  • mouse - A mouse is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
  • moves, adds and changes (MAC) - Moves, adds and changes (MAC) keep computing equipment in line with user needs and up-to-date, with disciplined process management.
  • Mozilla - Mozilla was Netscape Communication's nickname for Navigator, its first Web browser, and the name of an open source public collaboration created to develop Navigator.
  • Mozy (by Dell) - Mozy (by Dell) was a cloud backup service owned by Dell EMC that targeted customers ranging from consumers through to the enterprise.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close