MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with M
  • Magento Themes

    Themes allow users to change the look and functionality of a magento website or installation without altering the information content or structure of the site. Themes may be installed from the magento admin (System -> Design).

  • Magisto

    A web and mobile application that provides a free automatic video editing service for amateurs. It is available for mobile download at Google Play and Apple AppStore.

  • MagMIMO

    MagMIMO is a new long range wireless charging technology that works like wifi. With MagMIMO, you can charge your phone with in a radius of 30 CM from the charging point. The current capacity of wireless charging is limited to 1 CM.

  • Magnetic stripe reader

    A hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge. Magnetic stripe readers can be read by a computer program through a serial port , USB connection, or keyboard wedge.

  • Magnetic tape

    In computers, tape is an external storage medium, usually both readable and writable, consisting of a loop of flexible celluloid-like material that can store data in the form of tiny magnetic fields that can be read and also erased.

  • Magneto-Optical (MO) drive

    A popular way to back up files on a personal computer. As the term implies, an MO device employs both magnetic and optical technologies to obtain ultra-high data density. 

  • Mail server

    A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery.

  • Mail User Agent (MUA)

    A program that allows you to receive and send e-mail messages; it's usually just called an e-mail program. 

  • Mainframe

    A high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer. 

  • Mainframe Testing

    Mainframe Testing is similar to client-server applications testing, but one needs to know how to operate basic TSO and ISPF commands and menus, view mainframe files, look at and use SDSF or other output tool, log on CICS and transactions, use FTP or another transfer protocol, submit the batch job - it's for QA testing of mainframe applications. And plus, unlike the QA testing for another platform, like WEB and/or client-service, the mainframe is usually back-end, it requires the needs and understanding of COBOL, DB2, JCL, CICS, Assembler, VSAM, ISPF/TPF.

  • Maintenance Engineer

    Maintenance Engineer is a person who ensures the optimization of software, procedures and budgets to achieve better maintainability, reliability, and availability of the software.

  • Makefile

    A makefile is used with the UNIX make utility to determine which portions of a program to compile. A makefile is basically a script that guides the make utility to choose the appropriate program files that are to be compiled and linked together.

  • Malware (Malicious Software)

    A software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software, and includes viruses etc.

  • Malware Analysis

    Malware Analysis is the study of a malware by dissecting its different components and studying its behavior on the host computer's operating system. Static analysis gives an approximate picture at best. It is impossible to fully predict the behavior of all but the smallest programs. Static analysis has the advantage that it can reveal how a program would behave under unusual conditions, because we can examine parts of a program that normally do not execute. With dynamic analysis, we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. The advantage of dynamic analysis is that it can be fast and accurate. However, dynamic analysis has the disadvantage that "what you see is all you get". For the same reason that it is not possible to predict the behavior of a non-trivial program, it is also not possible to make a non-trivial program traverse all paths through its code.

  • Mammoth

    A magnetic tape and drive system used for computer data storage and archiving. The tapes measure eight millimeters (8 mm) across. A helical scanning technique is used to optimize the data transfer and storage rates.

  • Man-in-the-Middle (MitM) attack

    An exploit in which an intruder intercepts communications between two parties, usually an end user and a website. The attacker can use the information accessed to commit identity theft or other types of fraud.

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to