MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
  • Abstraction

      One of three central principles (along with encapsulation and inheritance). Through the process of abstraction, a programmer hides all but the relevant data about an object in order to reduce complexity and increase efficiency.

  • Accelerated Graphics Port (AGP)

    An interface specification that enables 3-D graphics to display quickly on personal computers other than an expensive graphics workstation.  

  • Accelerated Hub Architecture (AHA)

    An Intel 800-series chipset design that uses a dedicated bus to transfer data between the two main processor chips instead of using the Peripheral Component Interconnect (PCI) bus, which was used in previous chipset architectures. 

  • AcceleratedSAP (ASAP)

    A step-by-step methodology for speeding up the implementation of an SAP R/3 system by as much as 50%. The components of ASAP, are called 'Accelerators'. It consists of templates, questions, and scenarios that require user inputs.

  • Acceleration hardware

      Devices that speed up data communications, storage and retrieval, encryption and decryption, mathematical operations, graphics, and Web page viewing. They can consist of an individual IC chip, a printed circuit card, or a self-contained system.

  • Access control

    In the field of information security, access control is the selective restriction of access to a place or other resource.

  • Access Control List (ACL)

    A table that tells a computer OS which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. 

    IT Courses & Reviews (1)
  • Access log

    A list of all the requests for individual files that people have requested from a Web site. These files will include the HTML files and their imbedded graphic images and any other associated files that get transmitted. 

  • Access point

    In WLAN, an access point is a station that transmits and receives data. It connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. 

  • Access point mapping

    A.k.a War Driving, is the act of locating and possibly exploiting connections to WLANs while driving around a city or elsewhere. Once open networks are located, they can be used for any purpose including obtaining company documents.

  • AccessChk

      AccessChk is a free Sysinternals command-line utility that shows what access a user or group of users has to a particular service, file, folder or registry key in order to identify permissions errors. 

  • AccessEnum

    AccessEnum is a free Sysinternals tool that offers administrators a view of the full file system and registry security settings to ensure that users have appropriate permissions to access files and directories.  

  • Accutiy

    Accutiy provides banks and businesses worldwide with data and services that deliver optimal payment efficiency, compliant transactions, bank counterparty insight and AML Screening success. It has introduced SmartWorks, a new breend of payments and counterparty management solution. It also provides local language AML Screening capabilities and have set up new standards for dual-user and controlled goods screening to protect trade finance and ensure risk reduction.

  • Acer Iconia Tab A210

    A 10.1-inch tablet running on Android 4.1 Jelly Bean OS. It comes with a USB slot and a microSD card slot.

  • ACK Signal

    ACK is the name of a signal that data has been received successfully (as an acknowledgement). The ACK signal is sent by the receiving station (destination) back to the sending station (source) after the receipt of a recognizable block of data of specific size.   

  • Actimize

    Actimize is a largest provider of financial crime, risk and compliance solutions. It is a wholly owned subsidy of NICE systems

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url