Browse Definitions :

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • millimeter wave (mmWave)

    Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.

  • 5G

    Fifth-generation wireless (5G) is the latest iteration of cellular technology.

  • Android OS

    Android OS is a Linux-based mobile operating system that primarily runs on smartphones and tablets.

View All High-speed networks Definitions

Network Admin

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.

  • desktop virtualization

    Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.

  • event handler

    In programming, an event handler is a callback routine that operates asynchronously once an event takes place.

View All Network Admin Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.

  • event handler

    In programming, an event handler is a callback routine that operates asynchronously once an event takes place.

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone.

View All Network hardware Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

View All Networking and communications Definitions Back to Top

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • mobile device

    A mobile device is essentially a portable, handheld computer that enables users to access information, perform tasks and connect with other people and devices.

  • mobile security (wireless security)

    Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing.

  • Apple

    Apple Inc. (formerly Apple Computer Inc.) is an American computer and consumer electronics company famous for creating the iPhone, iPad and Macintosh computers.

View All Wireless and mobile Definitions Back to Top
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
  • Nvidia Omniverse

    Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial ...

  • model-based systems engineering (MBSE)

    Model-based systems engineering (MBSE) uses models to share information across collaborators in the design, development, test and...

  • digital strategy (digital media strategy)

    A digital strategy, sometimes called a digital media strategy, is a plan for maximizing the business benefits of data assets and ...

HRSoftware
  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close