Browse Definitions:
  • June 29, 2012 29 Jun'12

    light field

    The light field is the totality of photons (light particles) traveling in all directions throughout all points in space in a given area. Specifics within the light field can be determined according to the plenoptic function, which can identify any ...  Continue Reading

  • June 28, 2012 28 Jun'12

    light field camera

    A light field camera (also called a plenoptic camera) is an imaging device that creates images that can be readjusted after the picture has been taken, for example, to alter the focus or the depth of field.  Continue Reading

  • June 28, 2012 28 Jun'12

    light field photography

    Light-field photography (also known as plenoptic photography) is an imaging technology that makes it possible to adjust the focus in an existing picture. Unlike conventional images, any area in an image taken with a light-field camera can be brought...  Continue Reading

  • June 27, 2012 27 Jun'12

    microfinance

    Microfinance is the provision of savings accounts, loans, insurance, money transfers and other banking services to customers that lack access to traditional financial services, usually because of poverty.  Continue Reading

  • June 27, 2012 27 Jun'12

    microcredit

    Microcredit is a variation on traditional credit service that involves providing small loans to people who would otherwise be unable to secure credit, typically because of poverty. Related barriers may include unemployment or underemployment and a ...  Continue Reading

  • June 27, 2012 27 Jun'12

    emerging growth company

    An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.S. GAAP (generally accepted accounting ...  Continue Reading

  • June 26, 2012 26 Jun'12

    JOBS Act (Jumpstart Our Business Startups Act)

    The JOBS Act (Jumpstart Our Business Startups Act) is legislation that eases regulatory restrictions for new businesses to make it easier for startups to get established. The intention of the Act is to encourage more business startups, foster their ...  Continue Reading

  • June 26, 2012 26 Jun'12

    IMEI (International Mobile Equipment Identity)

    IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. The IMEI code can ensure that a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) ...  Continue Reading

  • June 25, 2012 25 Jun'12

    unique device identifier (UDID)

    A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch. Each UDID character is a numeral or a letter of the alphabet. Using the UDID, third parties, particularly app ...  Continue Reading

  • June 25, 2012 25 Jun'12

    Windows RT

    Windows RT (for "Runtime") is a version of Microsoft's Windows 8 operating system (OS) designed for mobile devices, particularly tablet PCs. The first installations of RT will be on the lower-end version of Microsoft's Surface tablet; the higher end...  Continue Reading

  • June 24, 2012 24 Jun'12

    crowdfunding

    Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals. Similarly to crowdsourcing, the concept from which it developed, crowdfunding's success relies upon the ability to canvass a ...  Continue Reading

  • June 21, 2012 21 Jun'12

    social coding

    Social coding is an approach to software development that places an emphasis on formal and informal collaboration.  Continue Reading

  • June 20, 2012 20 Jun'12

    Internet porn

    Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult ...  Continue Reading

  • June 19, 2012 19 Jun'12

    Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.   Continue Reading

  • June 19, 2012 19 Jun'12

    OpenFlow

    OpenFlow is a protocol that allows a server to tell network switches where to send packets. The packet-moving decisions are centralized, so that the network can be programmed independently of the individual switches and data center gear.  Continue Reading

  • June 18, 2012 18 Jun'12

    wipe

    Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.  Continue Reading

  • June 12, 2012 12 Jun'12

    Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)

    The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.  Continue Reading

  • June 11, 2012 11 Jun'12

    descriptive modeling

    Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.  Continue Reading

  • June 08, 2012 08 Jun'12

    electrical pollution (dirty electricity)

    Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring. These emissions, sometimes called dirty electricity, result from the use of appliances that generate irregular waveforms and transmit the resulting ...  Continue Reading

  • June 06, 2012 06 Jun'12

    Google Fiber

    Google Fiber is a project whose goal is to build a fiber optic communications infrastructure.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

  • adware

    Adware is any software application in which advertising banners are displayed while a program is running.

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close