MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
  • Cyber Forensics

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

    IT Courses & Reviews (2)
  • Cyber Safety

    Cyber-safety is the safe and responsible use of the Internet and all information and communication technology devices, including mobile phones, digital cameras, and webcams.

    IT Blogs (7)
  • CyberArk

    An enterprise product for managing account security.

  • Cybercrime

    Cyber Crime refers to any crime that deals with computers, networks and the internet. Some of the cybercrimes include identity theft, password thefts, internet frauds etc. which are done with the use of a computer or internet.

    IT Blogs (8) IT Courses & Reviews (5)
  • Cyberoam

    A vendor for information security products and services. It offers identity-based unified threat management (UTM) appliances, secure sockets layer virtual private networks (SSL VPN), remote access, endpoint security, and logging and reporting tools.

  • Cygwin

    An open source collection of tools that allows Unix or Linux applications to be compiled and run on a Windows OS from within a Linux-like interface. This capability helps developers to migrate applications from Unix or Linux to Windows-based systems.

  • D Programming

    D is a language with C-like syntax and static typing. It pragmatically combines efficiency, control, and modeling power, with safety and programmer productivity.

  • D-channel

    In the Integrated Services Digital Network (ISDN), the D-channel is the channel that carries control and signalling information. The B-channel ("B" for "bearer") carries the main data.

  • D3 DOT JS (D3.js)

    D3.js is a JavaScript library for creation and control of dynamic and interactive graphical forms in web browsers, based on data. D3 helps you bring data to life using HTML, SVG and CSS. D3’s emphasis on web standards gives you the full capabilities of modern browsers without tying yourself to a proprietary framework, combining powerful visualization components and a data-driven approach to DOM manipulation.

    IT Courses & Reviews (10)
  • Daemon

    A program that runs continuously and exists for the purpose of handling periodic service requests that a computer system expects to receive. The daemon program forwards the requests to other programs (or processes) as appropriate.

    IT Challenges (1) IT Courses & Reviews (15)
  • Dark backup

    A dark backup is one that can be run automatically without manual intervention.

  • Dart

    Dart is an open-source Web programming language developed by Google with a goal to ultimately replace JavaScript as the lingua franca of web development on the open web platform. Dart is a class-based, single inheritance, object-oriented language with C-style syntax. It supports interfaces, abstract classes, reified generics, and optional typing. Static type annotations do not affect the runtime semantics of the code. Instead, the type annotations can provide documentation for tools like static checkers and dynamic run time checks.

    IT Blogs (1) IT Courses & Reviews (10)
  • DAST (Dynamic Application Security Testing)

    Dynamic application security testing (DAST) technologies are designed to detect conditions indicative of a security vulnerability in an application in its running state. DAST is done from the outside looking in. While the application is in running state, the process tries to penetrate the application in a variety of ways to identify potential vulnerabilities, including those outside the code and in third-party interfaces. Since source code, byte code and binaries are not required with DAST, it is easier to use and less expensive than SAST tools.

  • DAT USB drive

    A tape drive with Digital Audio Tape (DAT) that can be plugged into a Universal Serial Bus (USB) connection as a simple and relatively low-cost way to back up data, especially data on servers.

  • Data storage

    Refers to components of computers that stores media and digital data for computing for some interval of time.

    IT Blogs (3)
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to