Are you puzzled by Business Technology terms or abbreviations? Are you looking for a dictionary that explains these Business Technology terms in plain English? Then you are at the right place. Reintivity’s Business Technology Glossary lists and explains the most commonly used terms in Business Technology news, content and resources. This is the best place for Business Technology beginners to start and familiarize themselves with Business Technology lingo.
- Personally Identifiable Information
- Accountable Care Organization
- Advanced Encryption Standard
- Border Gateway Protocol
- Brute Force Password Attack
- Business Continuity Plan
- Business Impact Analysis
- Centers for Medicare & Medicaid Services
- Certificate Authority
- Certificate Signing Request
- Computer Security Incident Response Team
- Computerized Provider Order Entry
- Consolidated Clinical Document Architecture
- Consolidated Health Informatics
- Cybersecurity Advisory
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Framework
- Decision-Support System
- Department of Homeland Security
- Electronic Health Record
- Electronic Prescribing
- Federal Health Architecture
- Health Information Exchange
- Health Information Technology
- Health Information Technology Advisory Committee
- Health Information Technology for Economic and Clinical Health
- Health Insurance Portability and Accountability Act
- Health Level Seven
- Healthcare Information Technology Standards Panel
- Chicago .NET Users Group
- Information and Communications Technology
- Information Technology
- Integrating the Healthcare Enterprise
- Internet Engineering Task Force
- Internet of Things
- Internet Protocol
- Internet Protocol Version 6
- Internet Service Provider
- Mean Time to Respond
- Model Privacy Notice
- Multi-State Information Sharing and Analysis Center
- National Center for Education Statistics
- Network Operations Center
- One-Time Password
- Personal Computer
- Personal Health Record
- Personal Identification Number
- Protected Health Information
- Public Switched Telephone Network
- Remote Desktop Protocol
- Security Operations Center
- Security Risk Assessment
- Transport Layer Security
- Trusted Computing Base
- Trusted Internet Connections
- Trusted Operating System
- Trusted Platform Module
- Trusted Third Party
- Unified Extensible Firmware Interface
- Uniform Resource Locator
- Uninterruptible Power Supply
- Universal Serial Bus
- Virtual Private Cloud
- Virtual Private Network
- Voice Over Internet Protocol
- Wide Area Network
- Wireless Access Point
- Zero-Day Attack
- Zero-Day Exploit
- Zero-Knowledge Proof
- Zero Trust Architecture