Browse Definitions :

Browse Definitions by Alphabet

  • Microsoft Teams - Microsoft Teams is cloud-based team collaboration software that offers core capabilities, including business messaging, calling, video meetings and file sharing.
  • Microsoft Technology Associate (MTA) certification - Microsoft Technology Associate (MTA) certification is the name of a suite of entry-level certifications offered by Microsoft that signify fundamental technology knowledge in those who earn it.
  • Microsoft UE-V (User Experience Virtualization) - Microsoft UE-V (User Experience Virtualization) is a tool that lets users move from one Windows device to another and maintain the same operating system and applications settings.
  • Microsoft USMT (User State Migration Tool) - The Microsoft User State Migration Tool (USMT) is a command-line utility used to transfer user files and settings between computers.
  • Microsoft Visual FoxPro (Microsoft VFP) - Microsoft Visual FoxPro (VFP) is an object-oriented programming environment with a built-in relational database engine.
  • Microsoft Windows 10 Shared PC Mode - Microsoft Windows 10 Shared PC Mode is an operating system feature that allows IT administrators to configure computers for multiple user access.
  • Microsoft Windows Assessment and Deployment Kit (Windows ADK) - The Microsoft Windows Assessment and Deployment Kit is a set of tools IT professionals can combine to prepare, assess and launch image-based Windows deployments.
  • Microsoft Windows Azure Active Directory (Windows Azure AD) - Microsoft Windows Azure Active Directory (Windows Azure AD or Azure AD) is a cloud service that provides administrators with the ability to manage end-user identities and access privileges.
  • Microsoft Windows Background Intelligent Transfer Service (BITS) - Microsoft Windows Background Intelligent Transfer Service (BITS) is a service in Microsoft Windows operating systems (OSes) that allows download from and upload of files to Hypertext Transfer Protocol (HTTP) web servers and Server Message Block (SMB) file servers.
  • Microsoft Windows Credential Guard - Microsoft Credential Guard is a security feature in Microsoft Windows operating system (OS) that isolates user credentials, such as login information, from the rest of the operating system.
  • Microsoft Windows Defender Device Guard - Windows Defender Device Guard is a security feature for Windows 10 and Windows Server designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.
  • Microsoft Windows Deployment Image Servicing and Management (DISM) - Microsoft Windows Deployment Image Servicing and Management (DISM) is a command-line tool that allows IT administrators to service Windows desktop images and virtual hard disks prior to deployment to users.
  • Microsoft Windows Features on Demand - Microsoft Windows Features on Demand is a feature that allows system administrators to add or remove roles and features in Windows 8 and Windows Server 2012, and later versions of the client and server operating system to alter the file size of those operating systems.
  • Microsoft Windows File Explorer - Microsoft Windows File Explorer is a graphical file management utility for the Windows operating system (OS).
  • Microsoft Windows Hello - Microsoft Windows Hello is a biometric identity and access control feature that supports fingerprint scanners, iris scanners and facial recognition technology on compatible devices running Windows.
  • Microsoft Windows Insider Program for Business - Microsoft Windows Insider Program for Business is a service for IT professionals who want to test preview builds of Windows 10 and Windows Server in the enterprise before general availability.
  • Microsoft Windows PowerShell DSC (Desired State Configuration) - Desired State Configuration (DSC) is a feature in PowerShell 4.
  • Microsoft Windows PowerShell Integrated Scripting Environment (ISE) - The Windows PowerShell Integrated Scripting Environment (ISE) is a graphical user interface and front-end hosting application for Windows PowerShell.
  • Microsoft Windows Recovery Environment (Windows RE) - The Microsoft Windows Recovery Environment, or Windows RE, is a simplified, scaled-back version of the Windows operating system that is used to boot the system when Windows 8.
  • Microsoft Windows Server 2016 - Microsoft Windows Server 2016 is Microsoft's server operating system (OS).
  • Microsoft Windows Server LTSC (Long-Term Servicing Channel) - Microsoft Windows Server LTSC (Long-Term Servicing Channel) is one of the servicing options available for users of the Windows Server operating system (OS).
  • Microsoft Windows Server OS (operating system) - Microsoft Windows Server OS (operating system) is a series of enterprise-class server operating systems designed to share services with multiple users and provide extensive administrative control of data storage, applications and corporate networks.
  • Microsoft Windows Subsystem for Linux (WSL) - Microsoft Windows Subsystem for Linux (WSL) is a series of Microsoft components that allow native Linux 64-bit Executable and Linkable Format (ELF64) binaries to run on the Windows kernel in the Windows 10 operating system (OS).
  • Microsoft Windows System Image Manager (SIM) - Microsoft Windows System Image Manager (SIM) is a tool in the Windows Assessment and Deployment Kit that IT professionals can use to create and manage unattended setup answer files for Windows before installing the operating system.
  • Microsoft Windows Update - Microsoft Windows Update is a security service for Windows users that, once activated, automatically searches for and installs updates.
  • MicroStrategy - MicroStrategy is an enterprise business intelligence (BI) application and software vendor.
  • microtargeting - Microtargeting (also called micro-niche targeting) is a marketing strategy that uses consumer data and demographics to identify the interests and preferences of specific individuals or small groups to send targeted advertisements that align with their interests.
  • microtrend - A microtrend is a tendency in the direction of some phenomenon that is fairly pervasive within a given sphere of influence and may only last for a few years, or even months.
  • middleware - Middleware is software that bridges the gap between applications and operating systems by providing a method for communication and data management.
  • MIDI (Musical Instrument Digital Interface) - Musical Instrument Digital Interface (MIDI) is a standard to transmit and store music, originally designed for digital music synthesizers.
  • milliampere-hour (mAh) - A milliampere-hour (mAh) is one-thousandth of an ampere hour (Ah), which can also be written as 1 mAh = 0.
  • millimeter wave (mmWave) - Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.
  • million instructions per second (MIPS) - Million instructions per second (MIPS) is a measure of a processor's speed, providing a standard for representing the number of instructions that a CPU can process in 1 second.
  • MIME (Multipurpose Internet Mail Extensions) - MIME, or Multipurpose Internet Mail Extensions, is an extension of the original email protocol.
  • mimikatz - Mimikatz is an open source malware program used by hackers and penetration testers to gather credentials on Windows computers.
  • MIMO (multiple input, multiple output) - MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).
  • mind-brain identity theory - Mind-brain identity theory is a philosophy that purports the mind and brain are the same.
  • mindshare (share of mind) - Mindshare, also known as share of mind, is an approach to marketing that involves attempting to make a company, brand or product the first one that comes to mind when a customer thinks of a particular market.
  • Mini-ITX - Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top boxes and network devices.
  • minimum marketable feature (MMF) - A minimum marketable feature (MMF) is the smallest set of functionality in a product that must be provided for a customer to recognize any value.
  • mirror site - A mirror site is a website or set of files on a computer server that has been copied to another computer server so that the site or files are available from more than one place.
  • mission-critical application - A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful.
  • MIT License (X11 license or MIT X license) - The MIT License (also known as the X11 license or MITX license) is a software license that was originally developed at the Massachusetts Institute of Technology.
  • Mitre ATT&CK framework - The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyber adversaries to help organizations strengthen their cybersecurity strategies.
  • mixed reality (hybrid reality, extended reality) - Mixed reality (MR) is a user environment in which physical reality and digital content are combined in a way that enables interaction with and among real-world and virtual objects.
  • mnemonic - In general, a mnemonic (from Greek mnemon or mindful; pronounced neh-MAHN-ik) is a memory aid, such as an abbreviation, rhyme or mental image that helps to remember something.
  • mob mentality (herd/hive mentality) - Mob mentality -- also called herd or hive mentality -- is the inclination that some humans have to be part of a large group, often neglecting their individual feelings in the process, and adopting the behaviors and actions of the people around them.
  • mob programming - Mob programming is a collaborative approach to software development in which a group of developers work together in real time on one task.
  • mobile app - A mobile app (or mobile application) is a software application developed specifically for use on small, wireless computing devices, such as smartphones and tablets, rather than desktop or laptop computers.
  • mobile application development - Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.
  • mobile application development platform (MADP) - A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and deploy mobile apps for smartphones or tablets.
  • mobile application management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile authentication - Mobile authentication is the verification of a user's identity via a mobile device using one or more authentication methods for secure access.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile cloud - The mobile cloud is Internet-based data, applications and related services accessed through smartphones, laptop computers, tablets and other portable devices.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • mobile CRM (mobile customer relationship management) - Mobile CRM, or mobile customer relationship management, enables those working in the field or remote employees to use mobile devices, such as smartphones and tablets, to access customer data and customer accounts wherever they are.
  • mobile data - Mobile data is internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection.
  • mobile device - A mobile device is essentially a portable, handheld computer that enables users to access information, perform tasks and connect with other people and devices.
  • mobile device management (MDM) - Mobile device management (MDM) software allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
  • mobile hotspot - A mobile hotspot is a portable hardware device that serves as a wireless access point for connecting devices to the internet.
  • mobile malware - Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile platform as a service (mPaaS) - Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile robot (mobile robotics) - A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
  • mobile security (wireless security) - Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile UI (mobile user interface) - A mobile UI (mobile user interface) is the graphical and usually touch-sensitive display on a mobile device, such as a smartphone or tablet, that allows the user to interact with the device's apps, features, content and functions.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a reseller of wireless communications services.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • model card in machine learning - A model card is a type of documentation that is created for, and provided with, machine learning models.
  • model of reflection - A model of reflection is a structured process that is used to guide personal and situational analysis and improvement.
  • model-based systems engineering (MBSE) - Model-based systems engineering (MBSE) uses models to share information across collaborators in the design, development, test and operation of complex systems.
  • model-based testing - Model-based testing (MBT) requires a test team to create a second, lightweight implementation of a software build- typically only the business logic - called the model.
  • model-driven development - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • model-view-controller (MVC) - In programming, model-view-controller (MVC) is an architectural design pattern that organizes an application's logic into distinct layers, each of which carries out a specific set of tasks.
  • Model-View-ViewModel (MVVM) - Model-View-ViewModel (MVVM) is a software design pattern that is structured to separate program logic and user interface controls.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • ModelOps (model operations) - ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
  • modulation - Modulation is the process of converting data into radio waves by adding information to an electronic or optical carrier signal.
  • module - A module is a distinct assembly of components that can be easily added, removed or replaced in a larger system.
  • molecule - A molecule is two or more atoms connected by chemical bonds, which form the smallest unit of a substance that retains the composition and properties of that substance.
  • moment of truth (marketing MOT) - A moment of truth (MOT) is marketing lingo for any opportunity a customer (or potential customer) has to form an impression about a company, brand, product or service.
  • Monad Manifesto - The Monad Manifesto is a document written by Jeffrey Snover in 2002 that outlined his idea for a new Windows systems administration tool named Monad, which was changed to Windows PowerShell.
  • MongoDB - MongoDB is an open source NoSQL database management program.
  • monolithic architecture - A monolithic architecture is the traditional unified model for the design of a software program.
  • Monster Worldwide - Monster Worldwide is an online recruiting company noted for its flagship Monster.
  • Monte Carlo simulation - A Monte Carlo simulation is a mathematical technique that simulates the range of possible outcomes for an uncertain event.
  • monthly recurring revenue (MRR) - Monthly recurring revenue (MRR) is income a company can reliably anticipate every 30 days and one of the key metrics for channel partner companies.
  • moonshot - In technology, a moonshot is an ambitious, exploratory and groundbreaking project undertaken without the assurance of near-term profitability or benefit and, perhaps, without a full investigation of potential risks and benefits.
  • morphological analysis - Morphological analysis is the process of examining possible resolutions to unquantifiable, complex problems involving many factors.
  • MoSCoW method - The MoSCoW method is a four-step approach to prioritizing which project requirements provide the best return on investment (ROI).
  • most significant bit (MSB) - The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.
  • motherboard - A motherboard is the main printed circuit board (PCB) in a computer.
  • motherboard tattoo - A motherboard tattoo is a colloquial term once used to denote an ID code that is written in the basic input/output system (BIOS) of a computer to uniquely identify the computer.
  • motor vehicle record (MVR) - A motor vehicle record (MVR) is the documentation of a person’s driving history.
  • mount point - A mount point is a directory on a file system that is logically linked to another file system.
  • mouse - A mouse is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
Networking
  • What is network scanning? How to, types and best practices

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • What is wavelength?

    Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated ...

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

Security
CIO
HRSoftware
Customer Experience
Close