Browse Definitions:
  • November 30, 2013 30 Nov'13

    microgrid

    A microgrid is a small-scale power grid of that can operate independently or in conjunction with the area’s main electrical grid. The practice of using microgrids is known as distributed, dispersed, decentralized, district or embedded energy ...  Continue Reading

  • November 29, 2013 29 Nov'13

    insider trading

    Insider trading is the buying and selling of securities based on information that has not been made available to the general public. Because insider information gives an investor an advantage over others, it is illegal and punishable by law.  Continue Reading

  • November 29, 2013 29 Nov'13

    earnings season

    Earnings season is the period following a fiscal quarter or fiscal year, when most publicly-traded companies report their financial results. The fiscal year of most corporations follows the calendar year so, for the common first quarter, which runs ...  Continue Reading

  • November 29, 2013 29 Nov'13

    blackout period

    A blackout period is a duration of time when access to something usually available is prohibited. In a financial context, it often means that a company's executives and/or employees who are privy to inside information are restricted from buying or ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind farm

    A wind farm or wind park is a grouping of wind turbines in an area. Wind farms are placed in areas of consistent and less turbulent airflow. They may be land-based (on-shore) or out at sea (off shore), either on platforms or on pillars coming from ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind power

    Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power. Sailing and similar activities are among the simplest, oldest and most direct applications of wind power. Mechanical ...  Continue Reading

  • November 27, 2013 27 Nov'13

    security (finance)

    A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded. The most common examples of securities are stocks and bonds. Securities are generally classified as either equity or debt ...  Continue Reading

  • November 27, 2013 27 Nov'13

    quiet period

    A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public. Quiet periods are mandated in ...  Continue Reading

  • November 25, 2013 25 Nov'13

    Happy Hour Virus

    Happy Hour Virus is a web app that makes the user's computer appear to be compromised by malware and, as a result, not working. As the name implies, the software is designed to allow the user to leave work early. The fake virus doesn't do any harm ...  Continue Reading

  • November 24, 2013 24 Nov'13

    bait and switch

    Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase. When a customer tries, unsuccessfully, to buy the item that was advertised, the seller tries...  Continue Reading

  • November 22, 2013 22 Nov'13

    waste heat recovery

    Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere. Waste heat recouping methods range from the simple to the complex. A common ...  Continue Reading

  • November 21, 2013 21 Nov'13

    rabbit hole

    A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots. The term comes from Lewis Carroll's "Alice's Adventures in Wonderland." The protagonist in that book, Alice, falls down a rabbit hole...  Continue Reading

  • November 21, 2013 21 Nov'13

    non-renewable resource

    A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way. The most common examples of non-renewable resources are fossil fuels, such as coal, oil and ...  Continue Reading

  • November 21, 2013 21 Nov'13

    Kyoto Protocol

    The Kyoto Protocol, also known as the Kyoto Accord, is an international treaty among industrialized nations that sets mandatory limits on greenhouse gas emissions.  Continue Reading

  • November 21, 2013 21 Nov'13

    business sustainability

    Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success. In a broader context, social, environmental and economic demands are ...  Continue Reading

  • November 20, 2013 20 Nov'13

    DNS amplification attack

    A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ...  Continue Reading

  • November 20, 2013 20 Nov'13

    skin effect

    Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.  Continue Reading

  • November 20, 2013 20 Nov'13

    CRUSH (Controlled Replication Under Scalable Hashing)

    CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.  Continue Reading

  • November 20, 2013 20 Nov'13

    MiFi

    MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.  Continue Reading

  • November 19, 2013 19 Nov'13

    LED light bulb

    An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light. LED light bulbs are a more environmentally-friendly alternative to incandescent bulbs.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close