Browse Definitions:
  • October 31, 2012 31 Oct'12

    likebaiting

    Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content. The practice is similar to linkbaiting, in which content producers craft content with the intent of getting people to link to...  Continue Reading

  • October 31, 2012 31 Oct'12

    network drive

    A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server. In a home, the network drive may be located on a dedicated server, one of the ...  Continue Reading

  • October 31, 2012 31 Oct'12

    crawl depth

    Crawl depth is the extent to which a search engine indexes pages within a website. Most sites contain multiple pages, which in turn can contain subpages. The pages and subpages grow deeper in a manner similar to the way folders and subfolders (or ...  Continue Reading

  • October 31, 2012 31 Oct'12

    alt text (alternative text)

    Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image. The alt text appears in a blank box that would normally...  Continue Reading

  • October 31, 2012 31 Oct'12

    search engine results page (SERP)

    A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.  Continue Reading

  • October 30, 2012 30 Oct'12

    SEO poisoning (search poisoning)

    Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently ...  Continue Reading

  • October 29, 2012 29 Oct'12

    Baxter industrial robot

    Baxter is an industrial robot produced by Rethink Robotics of Boston, Massachusetts. It contains cameras, sensors, and software that allow nontechnical people to operate it with ease. Baxter is a so-called "intelligent robot" that exhibits a ...  Continue Reading

  • October 29, 2012 29 Oct'12

    BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger ...  Continue Reading

  • October 26, 2012 26 Oct'12

    phablet

    A phablet is a computing device with a screen size between five and seven inches long. As the name implies, the device is essentially a tablet that also functions as a phone.  Continue Reading

  • October 24, 2012 24 Oct'12

    live USB (operating system on a stick)

    Windows To Go is a feature of Windows 8 Enterprise edition that allows administrators to put a full blown copy of Windows 8 on an external USB 3.0 storage device.  Continue Reading

  • October 23, 2012 23 Oct'12

    Windows To Go

    Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device. Microsoft promotes the feature as a useful tool for mobile employees and disaster recovery.  Continue Reading

  • October 23, 2012 23 Oct'12

    Oracle Unlimited License Agreement (ULA)

    An Oracle Unlimited License Agreement (ULA) is an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.  Continue Reading

  • October 23, 2012 23 Oct'12

    controller

    A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In a general sense, a controller is just something or someone that interfaces between two systems and ...  Continue Reading

  • October 22, 2012 22 Oct'12

    linkbaiting

    Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it. The purpose is increasing the number of inbound links to content and, as a result, improving the content's performance in search engine ...  Continue Reading

  • October 22, 2012 22 Oct'12

    Open Networking Foundation (ONF)

    The Open Networking Foundation (ONF) is a consortium dedicated to the development and standardization of software-defined networking (SDN).  Continue Reading

  • October 22, 2012 22 Oct'12

    brownout reset

    A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.  Continue Reading

  • October 22, 2012 22 Oct'12

    Intel 4004

    The Intel 4004 was one of the first microprocessors ever produced, released in 1971. The 4004 was designed by Federico Faggin, Masatoshi Shima and others.  Continue Reading

  • October 18, 2012 18 Oct'12

    VXLAN (Virtual Extensible LAN)

    Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants. Technically, VXLAN works by ...  Continue Reading

  • October 18, 2012 18 Oct'12

    sea change

    A sea change is a significant and/or systemic transformation. The term is frequently used in business and IT (information technology) contexts as an alternative to the less current buzzword, paradigm shift.  Continue Reading

  • October 12, 2012 12 Oct'12

    social task management

    Social task management (STM) is a real-time, collaborative software-based approach to business activities that have traditionally been conducted through sequential processes such as document sharing and status updates.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close