Browse Definitions:
  • May 31, 2013 31 May'13

    product placement

    Product placement is the inclusion of a branded product in media, usually without explicit reference to the product. Most commonly, branded products are featured in movies, television shows and videos. The practice is considered a type of pull ...  Continue Reading

  • May 31, 2013 31 May'13

    pull marketing

    Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods. The ultimate goal is to strengthen consumer awareness of a brand and products and foster demand.    Continue Reading

  • May 31, 2013 31 May'13

    electronic disposal efficiency (EDE) metric

    Electronic disposal efficiency (EDE) is the percentage of decommissioned information technology electronics and electrical equipment that is disposed of through known responsible entities.  Continue Reading

  • May 30, 2013 30 May'13

    inductive reasoning

    Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion. Inductive reasoning is often used in applications that involve prediction, ...  Continue Reading

  • May 30, 2013 30 May'13

    deductive reasoning

    Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.  Continue Reading

  • May 30, 2013 30 May'13

    data virtualization software

    Data virtualization software is application programming that facilitates querying data distributed across multiple internal and/or external storage systems.  Continue Reading

  • May 30, 2013 30 May'13

    Hot Spot 2.0 (HS 2.0)

    Hot Spot 2.0 (HS 2.0), also called Wi-Fi Certified Passpoint, is a new standard for public-access Wi-Fi that enables seamless roaming between WiFi and cellular networks. HS 2.0 is based on a set of protocols called 802.11u, which facilitates ...  Continue Reading

  • May 28, 2013 28 May'13

    engine-level encryption

    Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.  Continue Reading

  • May 28, 2013 28 May'13


    MyDiamo is database encryption software for MySQL that runs on virtually all platforms that MySQL supports, including Linux, UNIX and Windows.    Continue Reading

  • May 23, 2013 23 May'13

    flat address space

    1. A flat address space is a set of addresses arranged on a single level. It contrasts with a hierarchical address space, which is organized in subgroups. 2. In computer memory, a flat address space refers to a method of allocation in which each ...  Continue Reading

  • May 22, 2013 22 May'13

    push advertising

    Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards. Online examples of push advertising include ...  Continue Reading

  • May 21, 2013 21 May'13

    storage container

    A storage container is a defined, specific location in high-volume storage. It resembles a folder (or directory) in a computer's file system, although there are some differences in the way files are handled.  Continue Reading

  • May 21, 2013 21 May'13

    Amazon Web Services (AWS)

    Amazon Web Services (AWS) is a comprehensive, evolving cloud computing platform provided by Web services are sometimes called cloud services or remote computing services. The first AWS offerings were launched in 2006 to provide online ...  Continue Reading

  • May 17, 2013 17 May'13

    content marketing

    Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising. The essence of good content marketing is that it offers something the viewer ...  Continue Reading

  • May 16, 2013 16 May'13

    native advertising

    Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement. Although native content is often informational rather than...  Continue Reading

  • May 16, 2013 16 May'13

    dot com disclosures (.com disclosures)

    The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities. The FTC's original document "Dot Com Disclosures: Information About Online Advertising," issued in May 2000, dealt ...  Continue Reading

  • May 14, 2013 14 May'13

    four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all ...  Continue Reading

  • May 10, 2013 10 May'13

    passive cooling

    Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating. That approach contrasts with active cooling, which involves using fans in preference to slowing the ...  Continue Reading

  • May 10, 2013 10 May'13

    active cooling

    Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat.  Continue Reading

  • May 10, 2013 10 May'13


    ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.  Continue Reading




  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.


  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...


  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...


  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...