Browse Definitions:
  • September 28, 2012 28 Sep'12

    MicroBlaze

    MicroBlaze is the trade name for a soft processor core designed for Xilinx FPGAs (field-programmable gate arrays). An FPGA is an IC (integrated circuit) designed for configuration "in the field" by the user.  Continue Reading

  • September 28, 2012 28 Sep'12

    virtual address

    A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage  Continue Reading

  • September 27, 2012 27 Sep'12

    Plutchik's wheel of emotions

    Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.  Continue Reading

  • September 26, 2012 26 Sep'12

    rollover ad

    A rollover ad is an online advertisement that appears to be a static image until rollover activates it. Activation usually occurs as an expansion of the ad, often as video, or the launch of a pop-up window.  Continue Reading

  • September 25, 2012 25 Sep'12

    hierarchy

    A hierarchy is an organizational structure in which items are ranked according to levels of importance. Most governments, corporations and organized religions are hierarchical.  Continue Reading

  • September 25, 2012 25 Sep'12

    gray market

    The gray market (sometimes spelled as "grey market") is the collective system of unauthorized sales channels for products. Gray market products may be less expensive than those bought through official distribution channels but are typically inferior.  Continue Reading

  • September 24, 2012 24 Sep'12

    memory management unit (MMU)

    A memory management unit (MMU) is a computer hardware component that handles all memory and caching operations associated with the processor.  Continue Reading

  • September 24, 2012 24 Sep'12

    base address

    A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.  Continue Reading

  • September 24, 2012 24 Sep'12

    physical address

    A physical address is a binary number in the form of logical high and low states on an address bus that corresponds to a particular cell of primary storage (also called main memory), or to a particular register in a memory-mapped I/O (input/output) ...  Continue Reading

  • September 21, 2012 21 Sep'12

    backslash

    The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts. The backslash is represented as a keyboard character that is the mirror image of the forward slash ( / ), which is ...  Continue Reading

  • September 19, 2012 19 Sep'12

    tumblelog

    A tumblelog is a blog that supports short-form mixed media content. Tumblelog posts are brief comments that may contain audio, quotes, links, images or video.  Continue Reading

  • September 19, 2012 19 Sep'12

    Tumblr

    Tumblr is a free microblogging site. According to Tumblr, as of July 2012, the platform boasts more than 70 million blogs, 30 billion posts and 16 billion monthly page views. More than 50% of Tumblr visitors are under the age of 35.  Continue Reading

  • September 18, 2012 18 Sep'12

    registry key

    In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry. To a lay person, a registry key looks just like any other Windows folder.  Continue Reading

  • September 18, 2012 18 Sep'12

    interrupt vector

    An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.  Continue Reading

  • September 18, 2012 18 Sep'12

    paging

    Paging is a method of writing data to, and reading it from, secondary storage for use in primary storage, also known as main memory. Paging plays a role in memory management for a computer's OS (operating system).  Continue Reading

  • September 18, 2012 18 Sep'12

    memory management

    Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance.  Continue Reading

  • September 18, 2012 18 Sep'12

    menu bar

    The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.  Continue Reading

  • September 18, 2012 18 Sep'12

    Do Not Track (DNT)

    Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user. Firefox, Internet Explorer and Safari provide DNT settings; Google's Chrome browser does not.  Continue Reading

  • September 18, 2012 18 Sep'12

    TrueView ad

    TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds. Sponsors only pay for ads that are viewed to completion (or for 30 seconds, whichever comes first), or for those that ...  Continue Reading

  • September 17, 2012 17 Sep'12

    5 Whys

    Five Whys is a guided, team exercise for identifying the root cause of a problem. 5 Whys is used in the “analyze” phase of the Six Sigma DMAIC (define, measure, analyze, improve, control) methodology. It is also a useful tool for agile development ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close