A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A minimalistic computer operating system kernel designed to provide the most basic services to all other parts of the operating system and run in the privileged CPU mode. Unlike monolithic kernels, which include a wide variety of services within the kernel itself, a microkernel tries to run most services in user space to improve maintainability and security.
You will find this term commonly used in Operating Systems, Software Architecture
An integrated circuit that contains the functions of a central processing unit (CPU) on a single chip.
You will find this term commonly used in General IT
Microsegmentation is a security technique that divides a network into smaller, isolated zones to enhance security by controlling and restricting lateral movement of threats within the network.
You will find this term commonly used in Security, Networking, Cybersecurity
A software development approach where applications are divided into small, independently deployable services that communicate via APIs.
You will find this term commonly used in General IT
Microservices architecture is an architectural style that structures software applications as a collection of loosely coupled, independently deployable services, each responsible for specific business functions, enabling scalability and agility.
You will find this term commonly used in Software Architecture, Cloud Computing, Scalability
Offers certifications for its products and technologies, including Azure, Office 365, and Windows Server, catering to various roles like administrators, developers, and solutions architects.
You will find this term commonly used in Cloud Computing, Product-specific Technologies
A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.
You will find this term commonly used in Cloud Computing, Web Services
Validates skills in implementing, managing, and monitoring an organization’s Microsoft Azure environment.
You will find this term commonly used in Cloud Computing
Demonstrates the ability to apply data science and machine learning to implement and run machine learning workloads on Azure.
You will find this term commonly used in Data Science, Cloud Computing
Demonstrates expertise in computing, networking, storage, and security for designing solutions that run on Azure.
You will find this term commonly used in Cloud Computing
Validates the ability to transform, visualize, and analyze data using Microsoft Power BI.
You will find this term commonly used in Data Analysis
Demonstrates understanding of Microsoft Dynamics 365; its business applications, cloud solutions, and benefits.
You will find this term commonly used in CRM, ERP
Covers the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.
You will find this term commonly used in Security, Compliance
A suite of office productivity applications that includes Word, Excel, PowerPoint, and more.
You will find this term commonly used in General IT, Productivity
A relational database management system developed by Microsoft.
You will find this term commonly used in Databases
Software that acts as an intermediary between different applications, enabling communication and data management.
You will find this term commonly used in General IT
Software that provides common services and capabilities to applications outside of what's offered by the operating system.
You will find this term commonly used in Software Development
Middleware integration involves the integration of various middleware components and systems to facilitate seamless communication and data exchange between different applications and platforms.
You will find this term commonly used in Integration, General IT, Software Development
The process of managing the software that provides common services and capabilities to applications outside of what's offered by the operating system, facilitating communication and data management.
You will find this term commonly used in Software Development, IT Management
Software that provides common services and capabilities to applications beyond those offered by the operating system. This software mediates interaction between application components or between applications and the network.
You will find this term commonly used in Software Development, Networking
The process of moving data, applications, or other business elements from one environment to another.
You will find this term commonly used in General IT, Cloud Computing
A detailed plan that describes the process of moving from one system to another, covering data, applications, and hardware.
You will find this term commonly used in Cloud Computing, IT Infrastructure
A standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs.
You will find this term commonly used in Email Systems, Networking
A standard that indicates the nature and format of a document, file, or assortment of bytes. It stands for Multipurpose Internet Mail Extensions Type.
You will find this term commonly used in General IT, Web Development
The process of removing all unnecessary characters from source code without changing its functionality, used to reduce file size and improve load times in web development.
You will find this term commonly used in Web Development
A standard for wireless connections from devices (such as laptops, tablets, or smartphones) to displays (such as TVs, monitors, or projectors). It allows for screen mirroring.
You will find this term commonly used in Networking, General IT
An exact replica of a website or set of files hosted on a server at a different location to reduce network traffic, improve access speed, or improve availability.
You will find this term commonly used in Networking, Web Development
A redundancy solution that involves maintaining copies of a database, disk, or server to ensure continuous availability and minimize downtime in the event of hardware failure or maintenance.
You will find this term commonly used in Data Storage, Disaster Recovery
The merging of real and virtual worlds to produce new environments and visualizations where physical and digital objects co-exist and interact in real-time.
You will find this term commonly used in Virtual/Augmented Reality
A continuously self-configuring, infrastructure-less network of mobile devices connected without wires. MANETs are a kind of wireless ad hoc network that usually has a routable networking environment on top of a Link Layer ad hoc network.
You will find this term commonly used in Networking, Mobile Computing
Software designed to run on mobile devices such as smartphones and tablets, providing specific functionality or services.
You will find this term commonly used in General IT
Designs and develops applications for mobile devices, focusing on creating engaging and functional user experiences.
You will find this term commonly used in Mobile Development, Software Development
Mobile application development is the process of creating software applications that are designed to run on mobile devices such as smartphones and tablets.
You will find this term commonly used in Mobile Applications, Software Development
A model for providing web and mobile app developers with a way to link their applications to backend cloud storage and APIs exposed by back end applications while also providing features such as user management, push notifications, and integration with social networking services.
You will find this term commonly used in Mobile Development, Cloud Computing
High-speed internet access provided through mobile phone towers to computers, mobile phones, or other devices.
You will find this term commonly used in Networking, Telecommunications
The use of portable computing devices such as smartphones, tablets, and laptops to access and process information.
You will find this term commonly used in General IT
Mobile device management (MDM) is a security software solution that enables organizations to manage and secure mobile devices such as smartphones and tablets used by their employees.
You will find this term commonly used in Security, Mobile Applications, Device Management
Mobile device security refers to measures and technologies implemented to protect mobile devices such as smartphones and tablets from security threats, breaches, and unauthorized access.
You will find this term commonly used in Security, Mobile Applications, Cybersecurity
Mobile edge computing (MEC) is a network architecture that brings computing and storage resources closer to the edge of the network, enabling faster processing and lower latency for mobile applications.
You will find this term commonly used in Networking, Mobile Applications, Edge Computing
An approach to web design and development that prioritizes the mobile experience over desktop. The practice involves designing an online experience for mobile before designing it for the desktop Web or any other device.
You will find this term commonly used in Web Development, UI/UX Design
A mobile operating system is the software platform that manages hardware and provides core services and functionality for mobile devices such as smartphones and tablets.
You will find this term commonly used in Mobile Applications, Operating Systems
Mobile payment, also known as mobile money or mobile wallet, refers to the use of smartphones or other mobile devices to make financial transactions, either online or at physical locations.
You will find this term commonly used in Mobile Applications, E-commerce
Mobile security encompasses measures and technologies designed to protect mobile devices, data, and networks from security threats, breaches, and unauthorized access.
You will find this term commonly used in Security, Mobile Applications, Cybersecurity
Mobile virtualization is the process of creating virtualized instances of mobile devices, enabling multiple operating systems or applications to run independently on a single physical device.
You will find this term commonly used in Virtualization, Mobile Applications
A serial communication protocol developed for industrial applications, specifically to connect electronic equipment. It allows the communication among many devices connected to the same network, for example, a system that measures temperature and humidity and communicates the results to a computer.
You will find this term commonly used in Industrial IT, Networking
In software development, particularly in model-driven engineering and domain-driven design, a model is a simplified representation of the structure and behavior of a system, used to understand and predict its performance.
You will find this term commonly used in Software Development, Systems Design
A software development methodology focusing on creating and exploiting domain models, which are conceptual models of all the topics related to a specific problem.
You will find this term commonly used in Software Development, IT Management
A software architectural pattern that separates an application into three main logical components: the model, the view, and the controller.
You will find this term commonly used in Software Development
An architectural pattern used in software engineering that facilitates the separation of the development of the graphical user interface from the development of the business logic or back-end logic.
You will find this term commonly used in Software Development
A device that modulates and demodulates digital data for transmission over telephone lines or other communication channels.
You will find this term commonly used in Networking
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.