Browse Definitions :

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet. A service-level commitment (SLC) is a broader and more generalized form of an SLA.

  • millimeter wave (mmWave)

    Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.

  • 5G

    Fifth-generation wireless (5G) is the latest iteration of cellular technology.

View All High-speed networks Definitions

Network Admin

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.

  • desktop virtualization

    Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.

  • event handler

    In programming, an event handler is a callback routine that operates asynchronously once an event takes place.

View All Network Admin Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.

  • event handler

    In programming, an event handler is a callback routine that operates asynchronously once an event takes place.

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone.

View All Network hardware Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

View All Networking and communications Definitions Back to Top

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • mobile device

    A mobile device is essentially a portable, handheld computer that enables users to access information, perform tasks and connect with other people and devices.

  • mobile security (wireless security)

    Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing.

  • Apple

    Apple Inc. (formerly Apple Computer Inc.) is an American computer and consumer electronics company famous for creating the iPhone, iPad and Macintosh computers.

View All Wireless and mobile Definitions Back to Top
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close