Browse Definitions:

Word of the Day

sensor analytics

Sensor analytics is the statistical analysis of data that’s created by wired or wireless sensors. See More

Word of the Day Archive

Newest and Updated Terms


  • Biometrics could solve authentication woes

    Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access management.

  • When is MFA the best choice for mobile?

    MFA can improve the security of an app by using a layered approach rather than one that relies on passwords alone. To know whether it's right for your app, weigh its pros and cons.

Buzzword Alert

prescriptive analytics

Prescriptive analytics is a type of business analytics that focuses on finding the best course of action for a given situation, and belongs to a portfolio of analytic capabilities that include descriptive and predictive analytics.

Read More

Essential Knowledge

Dell IoT Division focuses on partnerships, OT-IT convergence

The recently announced Dell IoT Division is on track to make the company a one-stop IoT shop, thanks to numerous partnerships and new IoT initiatives.

Industrial IoT adoption rates high, but deployment maturity low

While IoT adoption rates in manufacturing, transportation, and oil and gas are on pace to reach 98% in the next year, many deployments are in early ...

With ThingWorx IoT platform, HIROTEC eyes predictive maintenance

Learn how one automotive supplier is using the ThingWorx IoT platform and Kepware IoT gateway to predict and eliminate machine downtime.

Systems integrators prep for IIoT future with ThingWorx IoT platform

Learn how two different systems integrators are helping bring IIoT to their clients, thanks to the ThingWorx IoT platform.



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...



    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

  • cloud hosting

    Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.