Browse Definitions:
  • October 31, 2012 31 Oct'12

    likebaiting

    Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content. The practice is similar to linkbaiting, in which content producers craft content with the intent of getting people to link to...  Continue Reading

  • October 31, 2012 31 Oct'12

    network drive

    A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server. In a home, the network drive may be located on a dedicated server, one of the ...  Continue Reading

  • October 31, 2012 31 Oct'12

    crawl depth

    Crawl depth is the extent to which a search engine indexes pages within a website. Most sites contain multiple pages, which in turn can contain subpages. The pages and subpages grow deeper in a manner similar to the way folders and subfolders (or ...  Continue Reading

  • October 31, 2012 31 Oct'12

    alt text (alternative text)

    Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image. The alt text appears in a blank box that would normally...  Continue Reading

  • October 31, 2012 31 Oct'12

    search engine results page (SERP)

    A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.  Continue Reading

  • October 30, 2012 30 Oct'12

    SEO poisoning (search poisoning)

    Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently ...  Continue Reading

  • October 29, 2012 29 Oct'12

    Baxter industrial robot

    Baxter is an industrial robot produced by Rethink Robotics of Boston, Massachusetts. It contains cameras, sensors, and software that allow nontechnical people to operate it with ease. Baxter is a so-called "intelligent robot" that exhibits a ...  Continue Reading

  • October 29, 2012 29 Oct'12

    BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger ...  Continue Reading

  • October 26, 2012 26 Oct'12

    phablet

    A phablet is a computing device with a screen size between five and seven inches long. As the name implies, the device is essentially a tablet that also functions as a phone.  Continue Reading

  • October 24, 2012 24 Oct'12

    live USB (operating system on a stick)

    Windows To Go is a feature of Windows 8 Enterprise edition that allows administrators to put a full blown copy of Windows 8 on an external USB 3.0 storage device.  Continue Reading

  • October 23, 2012 23 Oct'12

    Windows To Go

    Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device. Microsoft promotes the feature as a useful tool for mobile employees and disaster recovery.  Continue Reading

  • October 23, 2012 23 Oct'12

    Oracle Unlimited License Agreement (ULA)

    An Oracle Unlimited License Agreement (ULA) is an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.  Continue Reading

  • October 23, 2012 23 Oct'12

    controller

    A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In a general sense, a controller is just something or someone that interfaces between two systems and ...  Continue Reading

  • October 22, 2012 22 Oct'12

    linkbaiting

    Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it. The purpose is increasing the number of inbound links to content and, as a result, improving the content's performance in search engine ...  Continue Reading

  • October 22, 2012 22 Oct'12

    Open Networking Foundation (ONF)

    The Open Networking Foundation (ONF) is a consortium dedicated to the development and standardization of software-defined networking (SDN).  Continue Reading

  • October 22, 2012 22 Oct'12

    brownout reset

    A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.  Continue Reading

  • October 22, 2012 22 Oct'12

    Intel 4004

    The Intel 4004 was one of the first microprocessors ever produced, released in 1971. The 4004 was designed by Federico Faggin, Masatoshi Shima and others.  Continue Reading

  • October 18, 2012 18 Oct'12

    VXLAN (Virtual Extensible LAN)

    Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants. Technically, VXLAN works by ...  Continue Reading

  • October 18, 2012 18 Oct'12

    sea change

    A sea change is a significant and/or systemic transformation. The term is frequently used in business and IT (information technology) contexts as an alternative to the less current buzzword, paradigm shift.  Continue Reading

  • October 15, 2012 15 Oct'12

    data reduction in primary storage (DRIPS)

    Data reduction in primary storage (DRIPS) is the application of capacity optimization techniques like deduplication and compression, which are more typically used for backup, to a computer's primary storage.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

  • adware

    Adware is any software application in which advertising banners are displayed while a program is running.

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close