Browse Definitions:
  • October 30, 2005 30 Oct'05

    slice and dice

    To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.  Continue Reading

  • October 25, 2005 25 Oct'05

    humanware

    Humanware is hardware and software that emphasizes user capability and empowerment and the design of the user interface.  Continue Reading

  • October 20, 2005 20 Oct'05

    Ada

    Ada (pronounced AY-duh) is a programming language somewhat similar to Pascal that was selected in a competition and made a U.S. Defense Department standard.  Continue Reading

  • October 20, 2005 20 Oct'05

    Amdahl's law

    In computer programming, Amdahl's law is that, in a program with parallel processing, a relatively few instructions that have to be performed in sequence will have a limiting factor on program speedup such that adding more processors may not make ...  Continue Reading

  • October 14, 2005 14 Oct'05

    Navy Knowledge Online

    Navy Knowledge Online (NKO) is the United States Navy intranet.  Continue Reading

  • October 14, 2005 14 Oct'05

    docking station

    A docking station is a hardware frame and set of electrical connection interfaces that enable a notebook computer to effectively serve as a desktop computer.  Continue Reading

  • October 10, 2005 10 Oct'05

    female connector

    A female connector is a connector attached to a wire, cable, or piece of hardware, having one or more recessed holes with electrical terminals inside, and constructed in such a way that a plug with exposed conductors (male connector) can be inserted...  Continue Reading

  • October 05, 2005 05 Oct'05

    zsh

    Zsh is a shell (command interpreter) of the Bourne shell family, which also includes bash and the Korn shell (which zsh is said to resemble).  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close