Browse Definitions:
  • June 29, 2012 29 Jun'12

    light field

    The light field is the totality of photons (light particles) traveling in all directions throughout all points in space in a given area. Specifics within the light field can be determined according to the plenoptic function, which can identify any ...  Continue Reading

  • June 28, 2012 28 Jun'12

    light field camera

    A light field camera (also called a plenoptic camera) is an imaging device that creates images that can be readjusted after the picture has been taken, for example, to alter the focus or the depth of field.  Continue Reading

  • June 28, 2012 28 Jun'12

    light field photography

    Light-field photography (also known as plenoptic photography) is an imaging technology that makes it possible to adjust the focus in an existing picture. Unlike conventional images, any area in an image taken with a light-field camera can be brought...  Continue Reading

  • June 27, 2012 27 Jun'12

    microfinance

    Microfinance is the provision of savings accounts, loans, insurance, money transfers and other banking services to customers that lack access to traditional financial services, usually because of poverty.  Continue Reading

  • June 27, 2012 27 Jun'12

    microcredit

    Microcredit is a variation on traditional credit service that involves providing small loans to people who would otherwise be unable to secure credit, typically because of poverty. Related barriers may include unemployment or underemployment and a ...  Continue Reading

  • June 27, 2012 27 Jun'12

    emerging growth company

    An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.S. GAAP (generally accepted accounting ...  Continue Reading

  • June 26, 2012 26 Jun'12

    JOBS Act (Jumpstart Our Business Startups Act)

    The JOBS Act (Jumpstart Our Business Startups Act) is legislation that eases regulatory restrictions for new businesses to make it easier for startups to get established. The intention of the Act is to encourage more business startups, foster their ...  Continue Reading

  • June 26, 2012 26 Jun'12

    IMEI (International Mobile Equipment Identity)

    IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. The IMEI code can ensure that a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) ...  Continue Reading

  • June 25, 2012 25 Jun'12

    unique device identifier (UDID)

    A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch. Each UDID character is a numeral or a letter of the alphabet. Using the UDID, third parties, particularly app ...  Continue Reading

  • June 25, 2012 25 Jun'12

    Windows RT

    Windows RT (for "Runtime") is a version of Microsoft's Windows 8 operating system (OS) designed for mobile devices, particularly tablet PCs. The first installations of RT will be on the lower-end version of Microsoft's Surface tablet; the higher end...  Continue Reading

  • June 24, 2012 24 Jun'12

    crowdfunding

    Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals. Similarly to crowdsourcing, the concept from which it developed, crowdfunding's success relies upon the ability to canvass a ...  Continue Reading

  • June 21, 2012 21 Jun'12

    social coding

    Social coding is an approach to software development that places an emphasis on formal and informal collaboration.  Continue Reading

  • June 20, 2012 20 Jun'12

    Internet porn

    Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult ...  Continue Reading

  • June 19, 2012 19 Jun'12

    Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.   Continue Reading

  • June 19, 2012 19 Jun'12

    OpenFlow

    OpenFlow is a protocol that allows a server to tell network switches where to send packets. The packet-moving decisions are centralized, so that the network can be programmed independently of the individual switches and data center gear.  Continue Reading

  • June 18, 2012 18 Jun'12

    wipe

    Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.  Continue Reading

  • June 12, 2012 12 Jun'12

    Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)

    The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.  Continue Reading

  • June 11, 2012 11 Jun'12

    descriptive modeling

    Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.  Continue Reading

  • June 08, 2012 08 Jun'12

    electrical pollution (dirty electricity)

    Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring. These emissions, sometimes called dirty electricity, result from the use of appliances that generate irregular waveforms and transmit the resulting ...  Continue Reading

  • June 06, 2012 06 Jun'12

    Google Fiber

    Google Fiber is a project whose goal is to build a fiber optic communications infrastructure.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close