Browse Definitions:
  • July 31, 2012 31 Jul'12

    SafeSquid

    SafeSquid is an HTTP 1.1 content filtering proxy server.  Continue Reading

  • July 31, 2012 31 Jul'12

    National Informatics Centre (NIC)

    The National Informatics Centre (NIC) is an institute set up by the Indian government in 1976 to drive its technology and e-governance initiatives.  Continue Reading

  • July 30, 2012 30 Jul'12

    sensor

    A sensor is a device that detects and responds to some type of input from the physical environment. The specific input could be light, heat, motion, moisture, pressure, or any one of a great number of other environmental phenomena.  Continue Reading

  • July 30, 2012 30 Jul'12

    discrete event simulation (DES)

    Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events. In this context, an event comprises a specific change in the system's state at a specific point in time.  Continue Reading

  • July 27, 2012 27 Jul'12

    piggybacking

    Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN. The purpose is network access, rather than any malicious intent, but it can slow down data transfer for the legitimate network users.  Continue Reading

  • July 27, 2012 27 Jul'12

    Multipath I/O (MPIO)

    Multipath I/O (MPIO) is a Microsoft framework designed to mitigate the effects of a host bus adapter (HBA) failure by providing an alternate data path between storage network devices.  Continue Reading

  • July 27, 2012 27 Jul'12

    DGS&D (DGS&D rate contracts)

    DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry. Its role is to finalize the rate contracts to be used by Government departments to procure  items of general use.  Continue Reading

  • July 27, 2012 27 Jul'12

    Indian Institute of Information Technology (IIIT)

    The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.  Continue Reading

  • July 27, 2012 27 Jul'12

    Reserve Bank of India (RBI)

    The Reserve Bank of India (RBI) is the central banking authority of the country and dictates its monetary policy.  Continue Reading

  • July 27, 2012 27 Jul'12

    State Bank of India (SBI)

    State Bank of India (SBI) is the country's largest commercial bank, in terms of assets, deposits, and employees.   Continue Reading

  • July 27, 2012 27 Jul'12

    Apple Retina display

    The Apple Retina display is a backlit LCD (liquid crystal display) that provides resolution levels of 220 to 326 pixels per inch. Retina displays are included in recent models of Apple's mobile devices and the MacBook Pro notebook computer.  Continue Reading

  • July 27, 2012 27 Jul'12

    memory coherence

    Memory coherence is a desirable condition in which corresponding memory locations for each processing element in a multi-core processor always contain the same cached data. Without memory coherence, programs can be adversely affected.  Continue Reading

  • July 26, 2012 26 Jul'12

    resource-oriented architecture (ROA)

    A resource-oriented architecture (ROA) is the structural design supporting the internetworking of resources. A resource, in this context, is any entity that can be identified and assigned a uniform resource identifier (URI).  Continue Reading

  • July 23, 2012 23 Jul'12

    USART (Universal Synchronous/Asynchronous Receiver/Transmitter)

    A USART (Universal Synchronous/Asynchronous Receiver/Transmitter) is a microchip that facilitates communication through a computer's serial port using the RS-232C protocol.  Continue Reading

  • July 23, 2012 23 Jul'12

    bit slicing

    Bit slicing is a method of combining processor modules to multiply the word length. Bit slicing was common with early processors, notably the AMD (Advanced Micro Devices) 2900 series that originated in 1975.  Continue Reading

  • July 18, 2012 18 Jul'12

    Web stack

    A Web stack is the collection of software required for Web development. At a minimum, a Web stack contains an operating system, a programming language, database software and a Web server.  Continue Reading

  • July 18, 2012 18 Jul'12

    solution stack

    A solution stack is an ordered collection of software that makes it possible to complete a particular task. A server stack, for example, includes the software required for basic server functioning.  Continue Reading

  • July 17, 2012 17 Jul'12

    server stack

    A server stack is the collection of software that forms the operational infrastructure on a given machine. In a computing context, a stack is an ordered pile.  Continue Reading

  • July 17, 2012 17 Jul'12

    caching

    Caching (pronounced “cashing”) is the process of storing data in a cache. A cache is a temporary storage area.  Continue Reading

  • July 17, 2012 17 Jul'12

    voltage reference

    A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close