HyperText Transfer Protocol Secure
You’ll see this at the beginning of some website addresses. This indicates the connection has extra security. Also see HTTP. Other Names HTTPS
You’ll see this at the beginning of some website addresses. This indicates the connection has extra security. Also see HTTP. Other Names HTTPS
You’ll see this at the beginning of some website addresses. It’s the underlying protocol used by the World Wide Web. This protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. Also see HTTPS. Other Names HTTP
A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. Used in embedded systems, mobile phones, personal computers, workstations, and game consoles. Other Names GPU
A measurement used to distinguish speed of electronic transmissions. This term is especially relevant in data migration projects. Also see kbps and mbps. Other Names gbps
This regulation took effect in 2018 and standardizes data protection law across 28 EU countries. We’re in compliance with GDPR requirements. Other Names GDPR More Information We’ve talked extensively about GDPR compliance on the blog, check it out. See also PII
A standard network protocol used when transferring computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server. Other Names FTP
A set of API that allow programs to access Microsoft Exchange items. These are used for system integrations. For example, a software development team might use an API to display the unread email count from Exchange in their application. Other Names EWS
Data at rest is inactive/being stored/not currently being used. Data encryption prevents data visibility in the event of unauthorized access or theft. Data encryption is commonly used to protect data in motion and increasingly promoted for protecting data at rest. The term “encrypted at rest” is used to describe data that’s encrypted when it’s not … Read more
The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Other Names DNS
This usually relates to a server giving out IP addresses and other network configuration parameters to each device on a network so they can communicate with other IP networks. Other Names DHCP