Browse Definitions :

Browse Definitions by Alphabet

SearchNetworking
  • wireless mesh network (WMN)

    A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at ...

  • Wi-Fi 7

    Wi-Fi 7 is the pending 802.11be standard under development by IEEE.

  • network security

    Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.

SearchSecurity
  • What is the zero-trust security model?

    The zero-trust security model is a cybersecurity approach that denies access to an enterprise's digital resources by default and ...

  • RAT (remote access Trojan)

    A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target ...

  • supply chain attack

    A supply chain attack is a type of cyber attack that targets organizations by focusing on weaker links in an organization's ...

SearchCIO
  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • user experience

    User experience (UX) design is the process and practice used to design and implement a product that will provide positive and ...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close