Browse Definitions:
  • November 27, 2008 27 Nov'08

    Quiz: Talkin' tech turkey

    A quiz full of tasty tech terms. Can you talk tech turkey?  Continue Reading

  • November 25, 2008 25 Nov'08

    petaflop

    A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS)... (Continued)  Continue Reading

  • November 24, 2008 24 Nov'08

    triple bottom line (3BL)

    The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.  Continue Reading

  • November 24, 2008 24 Nov'08

    Reduce, reuse, recycle (R3)

    Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.  Continue Reading

  • November 20, 2008 20 Nov'08

    Microsoft Operations Framework (MOF)

    Microsoft Operations Framework (MOF) is a series of 23 documents that guide IT professionals through the processes of creating, implementing and managing efficient and cost-effective services.  Continue Reading

  • November 18, 2008 18 Nov'08

    white space device (WSD)

    A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space. White space spectrum was made ...  Continue Reading

  • November 13, 2008 13 Nov'08

    fast flux DNS

    Fast flux DNS is a technique that a cybercriminal can use to prevent identification of his key host server's IP address.  Continue Reading

  • November 13, 2008 13 Nov'08

    operational costs

    Definition - In information technology, operational costs document the price of running of IT services on a day-to-day basis.  Continue Reading

  • November 13, 2008 13 Nov'08

    milestone

    In project management, a milestone is a synchronization point.  Continue Reading

  • November 13, 2008 13 Nov'08

    IT asset

    An IT asset is any company-owned information, system or hardware that is used in the course of business activities.  Continue Reading

  • November 13, 2008 13 Nov'08

    incident

    An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.  Continue Reading

  • November 13, 2008 13 Nov'08

    change log

    A change log is a record of requests for change (RFCs) submitted for all changes in a service.  Continue Reading

  • November 13, 2008 13 Nov'08

    bug convergence

    In a software development project, bug convergence is the point at which the number of bugs fixed exceeds the number of bugs reported.  Continue Reading

  • November 13, 2008 13 Nov'08

    baseline

    What is a baseline?In project management, a baseline is a known state by which something is measured or compared.  Continue Reading

  • November 07, 2008 07 Nov'08

    History of the punch card

    Learn about the role of punch cards in the history of data and data management.  Continue Reading

  • November 06, 2008 06 Nov'08

    buckypaper

    Buckypaper is a strong and lightweight substance manufactured from compressed carbon nanotubes, which are long, cylindrical carbon structures consisting of hexagonal graphite molecules attached at the edges.  Continue Reading

  • November 06, 2008 06 Nov'08

    Mobile Telephony: Do you speak Geek on the phone?

    Vocabulary - Test your knowledge of mobile telephony by taking the following quiz.  Continue Reading

  • November 06, 2008 06 Nov'08

    SunOS

    SunOS was the UNIX-based operating system for Scalable Processor Architecture-based workstations and servers from Sun Microsystems.  Continue Reading

  • November 05, 2008 05 Nov'08

    Flexible Mandatory Access Control (FMAC)

    Flexible Mandatory Access Control (FMAC) is an ongoing project intended to enhance the Sun Microsystems OpenSolaris operating platform by adding two security technologies: Flux Advanced Security Kernel (Flask) and Type Enforcement (TE).  Continue Reading

  • November 04, 2008 04 Nov'08

    E-voting Glossary

    This glossary provides short definitions of the most common e-voting technologies, acronyms and concepts.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close