Browse Definitions:
  • April 30, 2012 30 Apr'12

    Jericho Forum

    The Jericho Forum is a global organization formed to help members deal the challenges of information security in an increasingly complex environment. (Continued)  Continue Reading

  • April 28, 2012 28 Apr'12

    CDAC

    The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.  Continue Reading

  • April 28, 2012 28 Apr'12

    cramming

    Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.  Continue Reading

  • April 26, 2012 26 Apr'12

    CCTV (closed circuit television)

    CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the ...  Continue Reading

  • April 26, 2012 26 Apr'12

    memory map

    A memory map is a massive table, in effect a database, that comprises complete information about how the memory is structured in a computer system.  Continue Reading

  • April 25, 2012 25 Apr'12

    Learn IT: Instant Messaging in the Enterprise

    Learn about the role of instant messaging in the enterprise in ten easy steps.  Continue Reading

  • April 25, 2012 25 Apr'12

    PIC microcontrollers

    PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.  Continue Reading

  • April 25, 2012 25 Apr'12

    glue logic

    Glue logic is a special form of digital circuitry that allows different types of logic chips or circuits to work together by acting as an interface between them.  Continue Reading

  • April 24, 2012 24 Apr'12

    Cyber Security Challenge UK

    Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting talented people to the IT security industry.  Continue Reading

  • April 23, 2012 23 Apr'12

    seven-segment display

    A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.  Continue Reading

  • April 20, 2012 20 Apr'12

    mickey

    The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.  Continue Reading

  • April 19, 2012 19 Apr'12

    Node.js

    Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.  Continue Reading

  • April 18, 2012 18 Apr'12

    monostable circuit

    A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).  Continue Reading

  • April 18, 2012 18 Apr'12

    context switch

    A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict.  Continue Reading

  • April 18, 2012 18 Apr'12

    power-on reset (PoR)

    A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.  Continue Reading

  • April 17, 2012 17 Apr'12

    passive reconnaissance

    Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.  Continue Reading

  • April 17, 2012 17 Apr'12

    active reconnaissance

    Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.  Continue Reading

  • April 17, 2012 17 Apr'12

    six thinking hats retrospective

    Six thinking hats is a tool for structuring a discussion.�  Continue Reading

  • April 13, 2012 13 Apr'12

    holographic print

    A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.  Continue Reading

  • April 13, 2012 13 Apr'12

    Privacy and Electronic Communications Regulations (PECR)

    The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close