A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A protocol used for the distribution, inquiry, retrieval, and posting of news articles using a reliable stream-based mechanism, typically used for Usenet newsgroups.
You will find this term commonly used in Networking, Applications
A platform that allows for the development of software applications without the need to write code, enabling non-programmers to create applications using graphical interfaces and configuration.
You will find this term commonly used in Software Development, Innovation
A device or data point in a network, such as a computer, printer, or router.
You will find this term commonly used in Networking
The process of distributing load evenly across nodes in a network or system to ensure no single node is overwhelmed, thereby enhancing performance and reliability.
You will find this term commonly used in Networking, Performance Management
An open-source, server-side platform built on Chrome's V8 JavaScript engine for building fast and scalable network applications.
You will find this term commonly used in General IT, Networking
In the context of information technology, noise refers to unwanted or irrelevant signals or data that interfere with the transmission or processing of useful information. It can degrade the quality of communication or introduce errors in data processing.
You will find this term commonly used in Networking, General IT
A security measure that ensures the integrity and origin of transmitted data, preventing the sender from denying responsibility for the message.
You will find this term commonly used in Security, Cybersecurity
A computer memory design used in multiprocessor systems, where the access time depends on the memory location relative to the processor.
You will find this term commonly used in Hardware, Architecture
Computer memory that retains its stored data even when powered off, such as flash memory and ROM.
You will find this term commonly used in General IT
A type of memory that retains its data even when power is turned off, commonly used for storing configuration settings.
You will find this term commonly used in Hardware, Data Storage
A type of computer memory that can retain the stored information even when not powered.
You will find this term commonly used in Data Storage, Hardware
In database theory, a property of a relational database schema, a measure of the database's freedom from certain kinds of anomalies and redundancies.
You will find this term commonly used in Databases, Design Principles
The process of organizing data in a database to reduce redundancy and improve data integrity.
You will find this term commonly used in Data Management, Databases
Network traffic that flows to and from the data center (or cloud) and the wider internet or other remote networks, in contrast to East-West traffic, which flows within a data center.
You will find this term commonly used in Networking, Data Center
An antivirus or anti-malware software product developed by NortonLifeLock.
You will find this term commonly used in Cybersecurity
NoSQL, or "Not Only SQL," refers to a type of database management system that provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.
You will find this term commonly used in General IT
A non-relational database that allows for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.
You will find this term commonly used in Databases, Data Management
An approach to database design that provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.
You will find this term commonly used in Databases, Data Management
A service that provides notifications to users or applications, typically through email, SMS, or webhooks, to alert them of events or changes in a system.
You will find this term commonly used in Software Development, Applications
A discontinued network operating system developed by Novell, widely used in the 1990s.
You will find this term commonly used in Networking
A classification of problems in computational complexity theory that are as hard as the hardest problems in NP (Non-deterministic Polynomial-time), and for which a solution can be verified in polynomial time.
You will find this term commonly used in Computer Science, Theory
A server that uses the Network Time Protocol to provide time synchronization to clients and devices on the network, ensuring accurate and consistent time across an organization.
You will find this term commonly used in Networking, IT Management
In programming, a pointer that does not point to any object or function, often used to signify the absence of a value or to terminate a linked list.
You will find this term commonly used in Programming, Software Development
A keypad that is dedicated to the input of numbers, commonly found as a part of a computer keyboard or as a standalone device.
You will find this term commonly used in Hardware, User Interface
A specification for accessing solid-state drives (SSDs) attached through the PCI Express (PCIe) bus, offering high throughput and low latency.
You will find this term commonly used in Hardware, Data Storage
A technology used in computers to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a means of preventing certain types of malicious software from executing.
You will find this term commonly used in Security, Hardware
An open-standard authorization protocol used for secure API authentication.
You will find this term commonly used in Security, Web Development, General IT
An authorization framework that enables applications to obtain limited access to user accounts on an HTTP service, such as Facebook, GitHub, and Google.
You will find this term commonly used in Security, Cybersecurity
Different authorization processes within the OAuth 2.0 framework, designed for various application scenarios, including authorization code flow, implicit flow, and client credentials flow.
You will find this term commonly used in Security, Web Development
A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group.
You will find this term commonly used in Security, Web Development
The deliberate act of creating source or machine code that is difficult for humans to understand, used to protect intellectual property or sensitive data within software.
You will find this term commonly used in Security, Software Development
The output of a compiler after it processes source code. Object code can be directly executed by a computer's hardware or can serve as input to a linker.
You will find this term commonly used in Software Development, Programming
The process of locating and classifying objects within images or video streams.
You will find this term commonly used in Computer Vision, AI, General IT
The process of managing the lifecycle of an object from its creation to its deletion, including phases such as creation, use, and disposal, often within the context of cloud storage.
You will find this term commonly used in Cloud Computing, Storage
The time during which an object exists in memory, from creation (instantiation) to destruction (garbage collection or deallocation).
You will find this term commonly used in Programming, Memory Management
The aspect of software development concerned with the creation, use, and cleanup of objects to manage memory and resources efficiently in programming languages, especially those with manual memory management.
You will find this term commonly used in Software Development, Memory Management
A technology developed by Microsoft that allows embedding and linking to documents and other objects. For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements.
You will find this term commonly used in Programming, Windows Development
An international, open membership, not-for-profit technology standards consortium that produces and maintains computer industry specifications for interoperable enterprise applications.
You will find this term commonly used in Standards, Enterprise IT
A collection of objects or classes through which a program can examine and manipulate some specific parts of its world. In essence, it is a map of objects and their relationships and how they can be manipulated.
You will find this term commonly used in Software Development
A software design pattern that involves creating a pool of objects that can be reused instead of creating and destroying them on demand.
You will find this term commonly used in Software Development, Performance Optimization
A query language standard for object-oriented databases, analogous to SQL for relational databases.
You will find this term commonly used in Database Management
A computer vision technique for identifying objects in images or videos. While closely related to object detection, it goes further by not only detecting objects within an image but also identifying them.
You will find this term commonly used in AI, Computer Vision
Advanced computer vision technology used to identify and detect objects within images or videos, pivotal in fields like autonomous driving, security surveillance, and augmented reality applications.
You will find this term commonly used in AI, Computer Vision
A programming technique for converting data between incompatible type systems in object-oriented programming languages and relational databases.
You will find this term commonly used in Software Development, Database Management, General IT
A centralized storage location for objects used in software testing and development, facilitating reuse of objects across different projects or parts of a project.
You will find this term commonly used in Software Development, Testing
Middleware that allows programs to send objects and request services from programs located on other computers in a network.
You will find this term commonly used in Networking, Software Development
The process of converting an object's state into a format that can be stored or transmitted and reconstructed later.
You will find this term commonly used in General IT, Programming
A method of storing data as objects, typically in a distributed system, where each object contains the data, metadata, and a unique identifier.
You will find this term commonly used in Data Storage, Cloud Computing, General IT
A storage device designed to manage digital data as objects, unlike traditional file or block storage, allowing for scalable, efficient storage solutions.
You will find this term commonly used in Data Storage, Cloud Computing
A storage architecture that manages data as objects, as opposed to block storage or file storage, which manage data as blocks within sectors or as a hierarchical file system.
You will find this term commonly used in Data Storage
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.