A cryptographic credential that replaces passwords.
A software update that modifies existing code to fix security vulnerabilities.
A cloud-based model that provides managed database systems.
A cloud-based model that replicates and hosts virtual or physical servers.
A cloud-based model in which a provider stores customers’ data backups remotely.
Software whose source code is proprietary and not publicly available for modification.
An organization that sells cloud-based services for customers.
The time between a user’s request and the system’s response.
The networked integration of industrial machinery, sensors and software systems.
A computer-based system that perceives data, reasons or learns from it.
The systems that support the operation of IT services.
A cloud vendor that operates large-scale, globally distributed infrastructure.
The processing capacity of computer systems used to run applications.
A facility that houses computing, storage and networking infrastructure.
A system design approach that ensures continuous operation with minimal downtime.
The use of aggregated computing resources to perform complex calculations at high speed.
An architecture that unifies data management, integration and governance.
An open source platform that automates running applications in containers.
A security vulnerability or attack in which an entity gains unauthorized access rights.
The process of converting readable data into an encoded form.