Browse Definitions:
  • December 21, 2012 21 Dec'12

    accessibility testing

    Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system.  Continue Reading

  • December 21, 2012 21 Dec'12

    recycling

    Recycling is the practice of reusing items that would otherwise be discarded as waste. Variations of recycling include upcycling, which involves adding value to an item for reuse, and downcycling, which involves breaking down an item or substance ...  Continue Reading

  • December 21, 2012 21 Dec'12

    static testing

    Static testing is a software testing method that involves examination of the program's code and its associated documentation but does not require the program be executed.  Continue Reading

  • December 21, 2012 21 Dec'12

    software testing

    Software testing is a method of assessing the functionality of a software program. There are many different types of software testing but the two main categories are dynamic testing and static testing.  Continue Reading

  • December 21, 2012 21 Dec'12

    dynamic testing

    Dynamic testing is a method of assessing the feasibility of a software program by giving input and examining output (I/O). The dynamic method requires that the code be compiled and run.  Continue Reading

  • December 20, 2012 20 Dec'12

    destructive testing

    Destructive testing is a software assessment method used to find points of failure in a program.  Continue Reading

  • December 20, 2012 20 Dec'12

    exploratory testing

    Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes. The simultaneous process ensures that developers have a more comprehensive ...  Continue Reading

  • December 20, 2012 20 Dec'12

    ad hoc test

    An ad hoc test is an unplanned and undocumented procedure designed to assess the viability of a product. The success of ad hoc testing relies upon the ability of the testers and their knowledge of the system.  Continue Reading

  • December 20, 2012 20 Dec'12

    ad hoc testing

    Ad hoc testing is a non-methodical approach to assessing the viability of a product. Commonly used in software development, ad hoc testing is performed without a plan of action, and actions taken are not typically documented.  Continue Reading

  • December 19, 2012 19 Dec'12

    electroluminescence

    Electroluminescence is a characteristic of a material, typically a semiconductor, that enables it to emit light in response to an electrical current or a strong electrical field.  Continue Reading

  • December 18, 2012 18 Dec'12

    General Architecture for Text Engineering (GATE)

    General Architecture for Text Engineering (GATE) is a development environment for writing software that can process human-language text. In particular, GATE is used for computational language processing and text mining.  Continue Reading

  • December 18, 2012 18 Dec'12

    voicemail preview

    Voicemail preview is a feature of unified messaging, and in particular voice-to-text messaging programs such as Microsoft Exchange. When voicemail preview is enabled, users can see a short summary of each message's contents, so that the messages can...  Continue Reading

  • December 18, 2012 18 Dec'12

    voicemail

    Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients. Callers leave short messages that are stored on digital media (or, in some older systems, on analog recording tape).  Continue Reading

  • December 18, 2012 18 Dec'12

    skewness

    Skewness is asymmetry in a statistical distribution, in which the curve appears distorted or skewed either to the left or to the right. Skewness can be quantified to define the extent to which a distribution differs from a normal distribution.  Continue Reading

  • December 18, 2012 18 Dec'12

    auto attendant (automated attendant)

    An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator. An AA may also be called a virtual receptionist. Most AAs can route calls to...  Continue Reading

  • December 18, 2012 18 Dec'12

    developmental robotics

    Developmental robotics is the use of human psychology principles in the design of intelligent, autonomous robots that learn from their own individual experiences. This field is also known as epigenetic robotics.  Continue Reading

  • December 18, 2012 18 Dec'12

    evolutionary robotics

    Evolutionary robotics is a computer-simulated method of creating intelligent, autonomous robots with particular traits, based on the principles of Darwin's theory of evolution. In evolutionary robotics, autonomous robots are treated as organisms ...  Continue Reading

  • December 18, 2012 18 Dec'12

    IT as a Service (ITaaS)

    IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.  Continue Reading

  • December 18, 2012 18 Dec'12

    bees algorithm

    The bees algorithm is a method of problem solving that mimics the behavior of honeybees to find the optimum solution. Based on the behaviors bees employ to search and prioritize, the algorithm is a classical example of swarm intelligence, in which ...  Continue Reading

  • December 14, 2012 14 Dec'12

    capacitive scanner

    A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and store a digital image of a human fingerprint.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close