Browse Definitions:
  • November 30, 2013 30 Nov'13


    A microgrid is a small-scale power grid of that can operate independently or in conjunction with the area’s main electrical grid. The practice of using microgrids is known as distributed, dispersed, decentralized, district or embedded energy ...  Continue Reading

  • November 29, 2013 29 Nov'13

    insider trading

    Insider trading is the buying and selling of securities based on information that has not been made available to the general public. Because insider information gives an investor an advantage over others, it is illegal and punishable by law.  Continue Reading

  • November 29, 2013 29 Nov'13

    earnings season

    Earnings season is the period following a fiscal quarter or fiscal year, when most publicly-traded companies report their financial results. The fiscal year of most corporations follows the calendar year so, for the common first quarter, which runs ...  Continue Reading

  • November 29, 2013 29 Nov'13

    blackout period

    A blackout period is a duration of time when access to something usually available is prohibited. In a financial context, it often means that a company's executives and/or employees who are privy to inside information are restricted from buying or ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind farm

    A wind farm or wind park is a grouping of wind turbines in an area. Wind farms are placed in areas of consistent and less turbulent airflow. They may be land-based (on-shore) or out at sea (off shore), either on platforms or on pillars coming from ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind power

    Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power. Sailing and similar activities are among the simplest, oldest and most direct applications of wind power. Mechanical ...  Continue Reading

  • November 27, 2013 27 Nov'13

    security (finance)

    A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded. The most common examples of securities are stocks and bonds. Securities are generally classified as either equity or debt ...  Continue Reading

  • November 27, 2013 27 Nov'13

    quiet period

    A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public. Quiet periods are mandated in ...  Continue Reading

  • November 25, 2013 25 Nov'13

    Happy Hour Virus

    Happy Hour Virus is a web app that makes the user's computer appear to be compromised by malware and, as a result, not working. As the name implies, the software is designed to allow the user to leave work early. The fake virus doesn't do any harm ...  Continue Reading

  • November 24, 2013 24 Nov'13

    bait and switch

    Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase. When a customer tries, unsuccessfully, to buy the item that was advertised, the seller tries...  Continue Reading

  • November 22, 2013 22 Nov'13

    waste heat recovery

    Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere. Waste heat recouping methods range from the simple to the complex. A common ...  Continue Reading

  • November 21, 2013 21 Nov'13

    rabbit hole

    A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots. The term comes from Lewis Carroll's "Alice's Adventures in Wonderland." The protagonist in that book, Alice, falls down a rabbit hole...  Continue Reading

  • November 21, 2013 21 Nov'13

    non-renewable resource

    A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way. The most common examples of non-renewable resources are fossil fuels, such as coal, oil and ...  Continue Reading

  • November 21, 2013 21 Nov'13

    Kyoto Protocol

    The Kyoto Protocol, also known as the Kyoto Accord, is an international treaty among industrialized nations that sets mandatory limits on greenhouse gas emissions.  Continue Reading

  • November 21, 2013 21 Nov'13

    business sustainability

    Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success.  Continue Reading

  • November 20, 2013 20 Nov'13

    DNS amplification attack

    A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ...  Continue Reading

  • November 20, 2013 20 Nov'13

    skin effect

    Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.  Continue Reading

  • November 20, 2013 20 Nov'13

    CRUSH (Controlled Replication Under Scalable Hashing)

    CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.  Continue Reading

  • November 20, 2013 20 Nov'13


    MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.  Continue Reading

  • November 19, 2013 19 Nov'13

    LED light bulb

    An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light. LED light bulbs are a more environmentally-friendly alternative to incandescent bulbs.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.