Systems that support the exchange of messages among members of a group, facilitating collaboration and information sharing.
You will find this term commonly used in Collaboration, Communication
A SQL operation that concatenates values from multiple rows within a group into a single string with various delimiters.
You will find this term commonly used in Database Management
Cryptographic methods that securely distribute cryptographic keys to a group of users for encrypted communication.
You will find this term commonly used in Cryptography, Security
A communication protocol that supports the exchange of messages within a group, ensuring efficient and secure communication.
You will find this term commonly used in Networking, Communication
A feature of Windows that provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.
You will find this term commonly used in Security / General IT
A feature of Windows that allows network administrators to manage and configure operating systems, applications, and user settings in an Active Directory environment.
You will find this term commonly used in Security / General IT
Software designed to help people involved in a common task to achieve their goals. It supports people in planning, scheduling, communicating, and collaborating.
You will find this term commonly used in Software Development / General IT
Software designed to help people involved in a common task achieve their goals by providing tools for shared environments and collaborative work.
You will find this term commonly used in Collaboration, Business Software
A now deprecated notification system for Mac OS X that allowed applications to send you notifications.
You will find this term commonly used in Software Development
A high-performance, open-source universal RPC framework that Google developed. gRPC is used to connect services in a microservices-style architecture.
You will find this term commonly used in Software Development
An open-source remote procedure call system initially developed by Google. It uses HTTP/2 for transport, Protocol Buffers as the interface description language, and provides features such as authentication, load balancing, and more.
You will find this term commonly used in Networking / Software Development
A JavaScript implementation of gRPC for browser clients. gRPC-Web enables web applications to directly call backend gRPC services, simplifying the building of web applications that communicate with microservices.
You will find this term commonly used in Web Development
A standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation digital cellular networks used by mobile devices.
You will find this term commonly used in Networking
In networking and messaging systems, a service guaranteeing that a message sent through a network or system is delivered to the recipient.
You will find this term commonly used in Networking
In computing, refers to a condition in which a system or component is assured to be in a specific state, often through the use of checks, balances, and redundancy to ensure data integrity and system reliability.
You will find this term commonly used in General IT / Security
In programming, conditional statements that check for particular conditions and return from the function early if those conditions are met, typically used to improve code readability and reduce nesting.
You will find this term commonly used in Software Development
A memory management technique used to help identify and protect against buffer overflows by placing a "guard" page adjacent to allocations in memory.
You will find this term commonly used in Software Development / Security
A language designed for formal program specification and verification, emphasizing commands guarded by boolean expressions.
You will find this term commonly used in Software Engineering
In Microsoft Hyper-V, Guarded Fabric is a combination of technologies for creating a security boundary for virtualized workloads. It uses Host Guardian Service (HGS) to ensure that Hyper-V hosts are healthy and trusted.
You will find this term commonly used in Security / Virtualization
Techniques in programming to ensure memory is allocated and used safely, protecting against overflow and other vulnerabilities.
You will find this term commonly used in Software Development, Security
The processes and technologies used to manage and monitor access to networks or systems for guests or temporary users.
You will find this term commonly used in Security, Network Administration
A separate network provided for guests to access the internet, isolated from the main network to protect sensitive information.
You will find this term commonly used in Networking, Security
An OS that runs on a virtual machine, as opposed to the host operating system which runs directly on the physical hardware.
You will find this term commonly used in Virtualization, Cloud Computing
The design and management of the experience for users who access a system or service temporarily without a permanent account.
You will find this term commonly used in User Experience, Security
A user interface that allows users to interact with electronic devices using graphical icons and visual indicators, as opposed to text-based interfaces, typed command labels, or text navigation.
You will find this term commonly used in General IT
The design and development of graphical user interfaces that are accessible to people with disabilities, such as through screen readers or keyboard navigation.
You will find this term commonly used in HCI, Accessibility
The use of software to automate interactions with graphical user interfaces, enabling automated testing or user interaction simulations.
You will find this term commonly used in Software Testing, Automation
A software development tool that simplifies the creation of graphical user interfaces by allowing developers to design forms and interfaces visually, without writing the underlying code manually.
You will find this term commonly used in Software Development / UX Design
The process of modifying the appearance and functionality of graphical user interfaces to meet user preferences or requirements.
You will find this term commonly used in Software Development
The process of designing the graphical user interface of a software application, focusing on maximizing usability and user experience.
You will find this term commonly used in Software Development / UX Design
A toolkit or library that provides developers with components and tools for building graphical user interfaces.
You will find this term commonly used in Software Development, GUI Design
Software and frameworks that assist developers in designing the visual components of software applications, including windows, dialogs, menus, and other graphical user interface elements.
You will find this term commonly used in Software Development / UI Design
A set of libraries that simplifies GUI application development by providing pre-designed elements, event management, and rendering.
You will find this term commonly used in Software Development
A prototype or wireframe of a graphical user interface used to visualize and test the design of a software application before development.
You will find this term commonly used in UI/UX Design, Software Development
The process of designing and building graphical user interfaces for software applications. This allows users to interact with electronic devices through graphical icons and visual indicators.
You will find this term commonly used in Software Development / UX Design
The process of testing a product's graphical user interface to ensure it meets its specifications. This is often part of software testing.
You will find this term commonly used in Software Development / General IT
Software applications used to test the graphical user interfaces of programs, ensuring that all elements, such as buttons, menus, dialogs, and images, function as expected.
You will find this term commonly used in Software Development / QA Testing
A collection of libraries and tools used by developers to create graphical user interfaces for software applications.
You will find this term commonly used in Software Development / UX Design
A collection of GUI elements (widgets) that can be used in the design of applications across different platforms.
You will find this term commonly used in Software Development, UI Design
A unique reference number used as an identifier in computer software. The term is commonly used in software development.
You will find this term commonly used in Software Development
A technique used in databases and distributed systems to ensure that data is uniquely identified across the system by using GUIDs to partition data into distinct subsets.
You will find this term commonly used in Database Management
A reference system used for generating unique IDs. GUIDs are used in software development to uniquely identify objects, components, or records.
You will find this term commonly used in Software Development
The unlikely event that two or more globally unique identifiers (GUIDs) generated at different times or by different systems are identical. GUIDs are designed to be unique, but their finite size means collisions, while extremely rare, are theoretically possible.
You will find this term commonly used in Software Development
An algorithm used to produce Globally Unique Identifiers (GUIDs). These algorithms aim to create identifiers that are unique not only within the scope of a single database or application but globally, across all instances and applications.
You will find this term commonly used in Software Development
A standard for the layout of the partition table on a physical storage device used in a desktop or server PC, such as a hard disk drive or solid-state drive.
You will find this term commonly used in Hardware / Data Storage
The system that manages the orientation and trajectory of vehicles, especially in aerospace, using various sensors and control systems.
You will find this term commonly used in Aerospace, Robotics
Companies or products that specialize in developing software for digital investigations and forensic analysis.
You will find this term commonly used in Security, Forensic Computing
A feature on mobile devices that limits the device to a single app and controls which features are available.
You will find this term commonly used in Mobile Development
The process of establishing protocols, standards, or procedures in IT projects or system design, ensuring consistency and best practices.
You will find this term commonly used in IT Governance, Project Management
A toolkit that helps developers automate and enhance their workflow. It provides a powerful and efficient streaming build system, making it easier to develop projects by automating tasks like minification, compilation, unit testing, and linting.
You will find this term commonly used in Web Development
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.