Browse Definitions:
  • July 31, 2005 31 Jul'05


    Gyricon is a type of electronic paper (sometimes called e-paper) developed at Xerox's Palo Alto Research Center (PARC).  Continue Reading

  • July 26, 2005 26 Jul'05

    dot pitch

    The dot pitch specification for a display monitor tells you how sharp the displayed image can be. The dot pitch is measured in millimeters (mm) and a smaller number means a sharper image. In desk top monitors, common dot pitches are .31mm, .28mm, ...  Continue Reading

  • July 22, 2005 22 Jul'05

    nuclear fusion

    Nuclear fusion is an atomic reaction in which multiple atoms combine to create a single, more massive atom.  Continue Reading

  • July 21, 2005 21 Jul'05


    Metabolomics is a term sometimes used to describe the emerging science of measurement and analysis of metabolites, such as sugars and fats, in the cells of organisms at specific times and under specific conditions.  Continue Reading

  • July 19, 2005 19 Jul'05


    Rosetta is a translation program that makes it possible to run most PowerPC applications on Intel-based Macintosh computers as non-native binary code.  Continue Reading

  • July 18, 2005 18 Jul'05

    analog computing

    Analog computing is a term used by Paul Saffo of the Institute for the Future in Palo Alto, California, to describe silicon-based microsensors that sense and react to external (natural) stimuli in something that approximates the rhythm of reality ...  Continue Reading

  • July 08, 2005 08 Jul'05

    thought recognition

    Thought recognition is the ability of a computer to recognize neural patterns in the brain as a form of input and control of computer processes.  Continue Reading

  • July 08, 2005 08 Jul'05

    universal constructor

    A universal constructor is a device that can self-replicate - that is, make copies of itself.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.