Browse Definitions:
  • November 30, 2012 30 Nov'12

    free/busy data

    Free/busy data is information about the availability of individuals within an organization at specified times. The user status data indicates whether the time period specified is free, busy or tentative, or if the user has set their out of office ...  Continue Reading

  • November 29, 2012 29 Nov'12

    Slashdot

    Slashdot is a socially curated website dedicated to technology-related news items. The site motto is "News for Nerds. Stuff that Matters."  Continue Reading

  • November 29, 2012 29 Nov'12

    SQL Server 2012

    Microsoft SQL Server 2012 is a relational database management system (RDBMS) designed for the enterprise environment. Like its predecessors, SQL Server 2012 comprises a set of programming extensions to enhance the Structured Query Language (SQL), a ...  Continue Reading

  • November 29, 2012 29 Nov'12

    database mirroring

    Database mirroring is the maintenance of redundant copies of a database to ensure continuous data availability and minimize or avoid downtime that might otherwise result from data corruption or loss, or when the operation of a network is partially ...  Continue Reading

  • November 28, 2012 28 Nov'12

    MCSA (Microsoft Certified Solutions Associate)

    MCSA (Microsoft Certified Solutions Associate) is a certification program intended for people who seek entry-level jobs in an IT (information technology) environment. MCSA is a prerequisite for more advanced Microsoft certifications.  Continue Reading

  • November 28, 2012 28 Nov'12

    pocket PC (pocket personal computer)

    A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.  Continue Reading

  • November 27, 2012 27 Nov'12

    IP address management (IPAM)

    Internet Protocol address management (IPAM) is a method of tracking and modifying the information associated with a network's Internet Protocol address (IP address) space. With IPAM, administrators can ensure that the inventory of assignable IP ...  Continue Reading

  • November 21, 2012 21 Nov'12

    PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used.  Continue Reading

  • November 20, 2012 20 Nov'12

    cluster quorum disk

    A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network. The cluster configuration database, also called the quorum, tells the cluster which physical server(s) should be active at any...  Continue Reading

  • November 16, 2012 16 Nov'12

    Ustream

    Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.  Continue Reading

  • November 14, 2012 14 Nov'12

    mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless...  Continue Reading

  • November 13, 2012 13 Nov'12

    discoverability

    Discoverability is the capacity of something to be found. The term is used in many different contexts in IT (information technology).  Continue Reading

  • November 09, 2012 09 Nov'12

    northbound interface / southbound interface

    A northbound interface is an interface that allows a particular component of a network to communicate with a higher-level component. Conversely, a southbound interface allows a particular network component to communicate with a lower-level component.  Continue Reading

  • November 09, 2012 09 Nov'12

    absolute link

    An absolute link is a hyperlink containing a full URL, which includes all the information needed to find a particular site, page or document or other addressable item on the Internet.  Continue Reading

  • November 08, 2012 08 Nov'12

    autoblog

    An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds. Autoblogging software does most of the work. The blog owner may not do much beyond selecting RSS feeds, determining schedules and selecting a few options.  Continue Reading

  • November 08, 2012 08 Nov'12

    boot storm

    A boot storm is what happens when a lot of end users log on to their computers at the same time.  Continue Reading

  • November 05, 2012 05 Nov'12

    enhanced driver's license (EDL)

    An enhanced driver's license (EDL) is a government-issued permit that, in addition to the standard features of a driver's license, includes an RFID tag that allows officials to pull up the owner's biographical and biometric data.  Continue Reading

  • November 02, 2012 02 Nov'12

    offensive security

    Offensive security is a proactive and antagonistic approach to protecting computer systems, networks and individuals from attacks.  Continue Reading

  • November 01, 2012 01 Nov'12

    Apache HTTP server project

    The Apache HTTP server project is a collaborative open source Web server development initiative. The project is spearheaded by the Apache Server Foundation.  Continue Reading

  • October 31, 2012 31 Oct'12

    hibernation

    Hibernation is a mode in which a computer is turned off but saves its state to resume when it is turned on again.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close