MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with H
  • Haptics

    Haptics is a tactile feedback that applies touch (tactile) sensation and control to interaction with computer applications. Haptic sensations are created in consumer devices by actuators, or motors, which create a vibration.  Those vibrations are managed and controlled by embedded software, and integrated into device user interfaces and applications via the embedded control software APIs.

  • Hard Disk Drive (HDD)

    The mechanism that controls the positioning, reading, and writing of the hard disk, which furnishes the largest amount of data storage for the PC. It is often shortened as 'hard drive'.

  • Hard drive overwrite

    A hard drive overwriter is a program or utility that repeatedly overwrites the data on a computer's hard drive with gibberish. By overwriting the entire hard drive with gibberish, the user ensures that their information remains inaccessible.

  • Hard drive shredder

    A mechanical device that physically destroys old hard drives in such a way that the data they contain cannot be recovered. At a minimum, this involves severing every track on every platter in a drive.

  • Hard-drive encryption

    A technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password.

  • Hardware

    In information technology, hardware is the physical aspect of computers, telecommunications, and other devices such as cables, connectors, power supply units, and peripheral devices such as the keyboard, mouse, audio speakers, and printers.

  • Hardware Abstraction Layer (HAL)

    A layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level. 

  • Hardware as a Service (HaaS)

    A differently in managed services and grid computing contexts. In managed services, HaaS is similar to licensing. In grid computing, HaaS is a pay-as-you-go model.

  • Hardware clustering

    A hardware-based method of turning multiple servers into a cluster (a group of servers that acts like a single system). As a rule, a hardware cluster is created by installing a number of blade servers on the machine that will control the cluster.

  • Hardware Description Language (HDL)

    A hardware description language (HDL) is a specialized computer language used to program the structure, design and operation of electronic circuits, and most commonly, digital logic circuits. It also allows for the compilation of an HDL program into a lower level specification of physical electronic components, such as the set of masks used to create an integrated circuit. A hardware description language looks much like a programming language such as C; it is a textual description consisting of expressions, statements and control structures. One important difference between most programming languages and HDLs is that HDLs explicitly include the notion of time. HDLs form an integral part of electronic design automation (EDA) systems, especially for complex circuits, such as microprocessors.

  • Hardware Load-Balancing (HLD) device

    A.k.a. Layer 4-7 router, is a physical unit that directs computers to individual servers in a network, based on factors such as server processor utilization, the number of connections to a server, or the overall server performance.

  • Hardware Security

    A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

  • Hardware virtualization

    Hardware virtualization is when the virtual machine manager is embedded in the circuits of a hardware component instead of being called up from a third-party software application. 

  • Hardware VPN

    The device, which contains a dedicated processor, manages authentication, encryption, and other VPN functions, and provides a hardware firewall. Hardware VPNs provide enhanced security for the enterprise.

  • Hardy Heron (Ubuntu 8.04)

    The code name for version 8.04 LTS Server Edition of Ubuntu, the open source Debian-based Linux distribution. It is widely recognized as one of the most easy-to-use desktop Linux distributions for novice users. 

  • Hash-based Message Authentication Code (HMAC)

    A message authentication code that uses a cryptographic key in conjunction with a hash function.   

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to