Browse Definitions:
  • June 29, 2012 29 Jun'12

    light field

    The light field is the totality of photons (light particles) traveling in all directions throughout all points in space in a given area. Specifics within the light field can be determined according to the plenoptic function, which can identify any ...  Continue Reading

  • June 28, 2012 28 Jun'12

    light field camera

    A light field camera (also called a plenoptic camera) is an imaging device that creates images that can be readjusted after the picture has been taken, for example, to alter the focus or the depth of field.  Continue Reading

  • June 28, 2012 28 Jun'12

    light field photography

    Light-field photography (also known as plenoptic photography) is an imaging technology that makes it possible to adjust the focus in an existing picture. Unlike conventional images, any area in an image taken with a light-field camera can be brought...  Continue Reading

  • June 27, 2012 27 Jun'12

    microfinance

    Microfinance is the provision of savings accounts, loans, insurance, money transfers and other banking services to customers that lack access to traditional financial services, usually because of poverty.  Continue Reading

  • June 27, 2012 27 Jun'12

    microcredit

    Microcredit is a variation on traditional credit service that involves providing small loans to people who would otherwise be unable to secure credit, typically because of poverty. Related barriers may include unemployment or underemployment and a ...  Continue Reading

  • June 27, 2012 27 Jun'12

    emerging growth company

    An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.S. GAAP (generally accepted accounting ...  Continue Reading

  • June 26, 2012 26 Jun'12

    JOBS Act (Jumpstart Our Business Startups Act)

    The JOBS Act (Jumpstart Our Business Startups Act) is legislation that eases regulatory restrictions for new businesses to make it easier for startups to get established. The intention of the Act is to encourage more business startups, foster their ...  Continue Reading

  • June 26, 2012 26 Jun'12

    IMEI (International Mobile Equipment Identity)

    IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. The IMEI code can ensure that a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) ...  Continue Reading

  • June 25, 2012 25 Jun'12

    unique device identifier (UDID)

    A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch. Each UDID character is a numeral or a letter of the alphabet. Using the UDID, third parties, particularly app ...  Continue Reading

  • June 25, 2012 25 Jun'12

    Windows RT

    Windows RT (for "Runtime") is a version of Microsoft's Windows 8 operating system (OS) designed for mobile devices, particularly tablet PCs. The first installations of RT will be on the lower-end version of Microsoft's Surface tablet; the higher end...  Continue Reading

  • June 24, 2012 24 Jun'12

    crowdfunding

    Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals. Similarly to crowdsourcing, the concept from which it developed, crowdfunding's success relies upon the ability to canvass a ...  Continue Reading

  • June 21, 2012 21 Jun'12

    social coding

    Social coding is an approach to software development that places an emphasis on formal and informal collaboration.  Continue Reading

  • June 20, 2012 20 Jun'12

    Internet porn

    Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult ...  Continue Reading

  • June 19, 2012 19 Jun'12

    Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.   Continue Reading

  • June 19, 2012 19 Jun'12

    OpenFlow

    OpenFlow is a protocol that allows a server to tell network switches where to send packets. The packet-moving decisions are centralized, so that the network can be programmed independently of the individual switches and data center gear.  Continue Reading

  • June 18, 2012 18 Jun'12

    wipe

    Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.  Continue Reading

  • June 12, 2012 12 Jun'12

    Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)

    The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.  Continue Reading

  • June 11, 2012 11 Jun'12

    descriptive modeling

    Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.  Continue Reading

  • June 08, 2012 08 Jun'12

    electrical pollution (dirty electricity)

    Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring. These emissions, sometimes called dirty electricity, result from the use of appliances that generate irregular waveforms and transmit the resulting ...  Continue Reading

  • June 06, 2012 06 Jun'12

    Google Fiber

    Google Fiber is a project whose goal is to build a fiber optic communications infrastructure.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close