A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Also known as a motherboard, it's the main printed circuit board (PCB) in general-purpose computers and other expandable systems which holds many of the crucial electronic components.
You will find this term commonly used in Hardware
A powerful computer used primarily by large organizations for critical applications, such as processing transactions and managing databases.
You will find this term commonly used in General IT
The process of dividing a mainframe's resources into multiple virtual machines, allowing for the efficient utilization and management of these powerful systems.
You will find this term commonly used in Virtualization
The modification of a software product after delivery to correct faults, to improve performance or other attributes, or to adapt the product to a changed environment.
You will find this term commonly used in Software Development
A software update released to fix bugs, vulnerabilities, and minor performance issues without adding new features to the system.
You will find this term commonly used in Software Development, Maintenance
A file containing a set of directives used by a make build automation tool to generate a target/goal.
You will find this term commonly used in Software Development, Automation
Software that is intentionally designed to cause damage to a computer, server, client, or computer network.
You will find this term commonly used in Cybersecurity
Any software intentionally designed to cause damage to a computer, server, client, or computer network.
You will find this term commonly used in Security, Cybersecurity
Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
You will find this term commonly used in Cybersecurity
The process of examining malware samples to understand their behavior, purpose, and potential impact.
You will find this term commonly used in Cybersecurity
A cyber attack where a malicious actor intercepts and possibly alters communication between two parties without their knowledge.
You will find this term commonly used in Cybersecurity
Code that is executed by a virtual machine instead of directly by the CPU, providing features like garbage collection and type safety.
You will find this term commonly used in Software Development
A service model in which a hosting provider leases dedicated servers and associated hardware to a single client, with the provider managing those systems on the client's behalf.
You will find this term commonly used in Web Hosting, Cloud Computing
In network management, a physical or virtual component of the network that can be managed or monitored.
You will find this term commonly used in Networking, Network Management
A service offered by external providers to optimize or manage a company’s document output to certain objectives.
You will find this term commonly used in IT Management
An IT service provider that specializes in providing security services such as cyber security monitoring and management.
You will find this term commonly used in Security, Cybersecurity
Managed services refer to the practice of outsourcing the responsibility for maintaining and managing certain IT functions and systems to a third-party service provider.
You will find this term commonly used in General IT, Outsourcing
A graphical user interface or command-line tool that provides administrators and users with the ability to manage and monitor applications, services, or infrastructure.
You will find this term commonly used in General IT, Networking
An organized collection of hardware, software, infrastructure, data, and policies designed to generate and disseminate useful information to managers and other personnel in an organization.
You will find this term commonly used in General IT, Data Management
A file in software development that contains metadata for a group of accompanying files that are part of a set or project.
You will find this term commonly used in Software Development
A method of evaluating the security of a computer system or network by simulating an attack from a malicious source, conducted manually by security experts.
You will find this term commonly used in Cybersecurity
The process of manually testing software for defects by a tester who plays the role of an end user to ensure that all the features of an application are working correctly.
You will find this term commonly used in Software Development, Testing
A control system for managing and monitoring work-in-process on a factory floor to ensure the effective execution of manufacturing operations.
You will find this term commonly used in Industrial IT, Manufacturing
A programming interface provided by Apple that allows developers to integrate mapping data and services into their applications.
You will find this term commonly used in Software Development, Mobile Apps
Relates to various computing disciplines including data structures, data storage and retrieval, computer graphics, and networking, referring to the process of linking two or more disparate elements or datasets.
You will find this term commonly used in General IT, Data Management
A programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.
You will find this term commonly used in Big Data, Cloud Computing
A lightweight markup language with plain-text-formatting syntax, designed so that it can be converted to HTML and many other formats.
You will find this term commonly used in Software Development, Documentation
The process of converting Markdown text (a lightweight markup language) into HTML or other formats, used to create formatted text using a plain-text editor.
You will find this term commonly used in Web Development, Documentation
A modelling technique based upon the theory that if you buy a certain group of items, you are more (or less) likely to buy another group of items.
You will find this term commonly used in Data Analysis, Marketing
A system for annotating a document in a way that is syntactically distinguishable from the text.
You will find this term commonly used in General IT
A structured data vocabulary that helps search engines understand the information on web pages and provide richer search results.
You will find this term commonly used in Web Development, SEO
A tool that checks the validity of Web documents written in languages like HTML and XHTML to ensure they comply with standards.
You will find this term commonly used in Web Development
A web page or application created by combining data or functionality from different sources to create new services.
You will find this term commonly used in Web Development
A tool that allows users to create web pages or applications by combining content, presentation or functionality from different sources.
You will find this term commonly used in Web Development
A preliminary visual guide or blueprint for a website or application that combines content or functionality from multiple sources to create a new service.
You will find this term commonly used in Web Development, Design
A type of video game that is capable of supporting large numbers of players simultaneously, typically all playing in a vast virtual world.
You will find this term commonly used in Gaming, Online Communities
The consistent and uniform set of identifiers and extended attributes that describe the core entities of the enterprise and are used across multiple business processes.
You will find this term commonly used in Data Management
A process that ensures consistency and accuracy of an organization's core data, such as customer or product information, across multiple systems.
You will find this term commonly used in General IT
A template page used in web frameworks (like ASP.NET) that defines common structure and interface elements for the website or web application.
You will find this term commonly used in Web Development
A model of communication where one device or process (master) controls one or more other devices or processes (slaves).
You will find this term commonly used in Networking, Software Development
A design language developed by Google, expanding on the "cards" that debuted in Google Now, for use in interface design for Android devices.
You will find this term commonly used in UI/UX Design, Web Development
A database object that contains the results of a query which can be updated from the original database periodically and behaves like a table.
You will find this term commonly used in Databases, Data Warehousing
An organizational structure in which some individuals report to more than one supervisor or leader, relationships described as solid line or dotted line reporting.
You will find this term commonly used in Business Management, IT Management
A build automation tool used primarily for Java projects, which provides a comprehensive model for projects' build, documentation, and reporting.
You will find this term commonly used in Software Development
The largest size of a data packet that can be sent over a network. MTU size is an important factor in the performance of network connections.
You will find this term commonly used in Networking
A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value, typically rendered as a 32 character hexadecimal number, used for data integrity.
You will find this term commonly used in Cybersecurity, Data Integrity
A method of managing the organization's critical data. It involves the processes, governance, policies, standards, and tools that consistently define and manage the critical data of an organization to provide a single point of reference.
You will find this term commonly used in Data Management
A collection of JavaScript-based technologies (MongoDB, Express.js, AngularJS, and Node.js) used to develop web applications.
You will find this term commonly used in Software Development, Web Development
An indicator used to predict the time between inherent failures of mechanical or electronic systems, during normal system operation.
You will find this term commonly used in Hardware, Networking
The average time that a device will operate before failing, important for understanding how long a system is typically down before repair or replacement.
You will find this term commonly used in Security, Network Management
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.