MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with K
  • Kali Linux

    Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. It comes preinstalled in over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine.

  • Kanban

    Kanban is a method for managing knowledge work with an emphasis on just-in-time delivery while not overloading the team members. In this approach, the process, from definition of a task to its delivery to the customer, is displayed for participants to see. Team members pull work from a queue. Kanban in the context of software development can mean a visual process-management system that tells what to produce, when to produce it, and how much to produce.

  • Kaspersky Anti-Virus

    Kaspersky Anti-Virus is an antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and Mac OS X, though a version for Linux is available for business consumers. Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers malicious tools and auto-dialers, as well as detection and removal of rootkits.

  • Kendo UI

    Kendo UI is an HTML5, jQuery-based framework for building modern web apps. The framework features lots of UI widgets, a rich data visualization framework, an auto-adaptive mobile framework, and all the tools needed for HTML5 app development, such as data source, templates, MVVM, drag-and-drop component, and more.

  • Kerberos (Protocol)

    A computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

  • Keyboard

    A primary text input device on most computers. The keyboard also contains certain standard function keys, such as the Escape key, tab and cursor movement keys, shift and control keys, and sometimes other manufacturer-customized keys.

  • Keyboard Shortcuts

    Keyboard shortcuts are typically a means for invoking one or more commands using the keyboard that would otherwise be accessible only through a menu, a pointing device, different levels of a user interface, or via a command-line interface. Keyboard shortcuts are generally used to expedite common operations by reducing input sequences to a few keystrokes, hence the term "shortcut".

  • Keyboard wedge

    A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer. 

  • Keyhole Markup Language (KML)

    An XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or 3-D Earth browsers (such as Google Earth). 

  • Keylogger

    A hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. It is used in IT organizations to troubleshoot technical problems with computers and business networks.

  • Keylogging

    The action of tracking (or logging) the keys struck on a keyboard using a keylogger. Typically, it is done in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

  • Keyphone (K/P or key station)

    Commonly used by a company within its private automatic branch exchange (PABX) telephone system, a keyphone is a telephone with the extra buttons and the intelligence to allow incoming calls to be transferred to other extensions. 

  • Keystroke logging

    Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

  • Keyword Planner

  • Keyword Stuffing

    The practice of inserting a large number of keywords into Web content and meta tags in the attempt to artificially increase a page's ranking in search results and drive more traffic to the site. 

  • Kindle Paperwhite

    The Kindle Paperwhite was released on October 1, 2012 in the United States. It has a 6", 212 ppi display with built-in light and has 2GB of storage. It is available in Wi-Fi and Wi-Fi + 3G models. The light is one of the main features of the Paperwhite, however the light level must be adjusted manually.

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to