Browse Definitions:
  • May 31, 2013 31 May'13

    product placement

    Product placement is the inclusion of a branded product in media, usually without explicit reference to the product. Most commonly, branded products are featured in movies, television shows and videos. The practice is considered a type of pull ...  Continue Reading

  • May 31, 2013 31 May'13

    pull marketing

    Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods. The ultimate goal is to strengthen consumer awareness of a brand and products and foster demand.    Continue Reading

  • May 31, 2013 31 May'13

    electronic disposal efficiency (EDE) metric

    Electronic disposal efficiency (EDE) is the percentage of decommissioned information technology electronics and electrical equipment that is disposed of through known responsible entities.  Continue Reading

  • May 30, 2013 30 May'13

    inductive reasoning

    Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion. Inductive reasoning is often used in applications that involve prediction, ...  Continue Reading

  • May 30, 2013 30 May'13

    deductive reasoning

    Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.  Continue Reading

  • May 30, 2013 30 May'13

    data virtualization software

    Data virtualization software is application programming that facilitates querying data distributed across multiple internal and/or external storage systems.  Continue Reading

  • May 30, 2013 30 May'13

    Hot Spot 2.0 (HS 2.0)

    Hot Spot 2.0 (HS 2.0), also called Wi-Fi Certified Passpoint, is a new standard for public-access Wi-Fi that enables seamless roaming between WiFi and cellular networks. HS 2.0 is based on a set of protocols called 802.11u, which facilitates ...  Continue Reading

  • May 28, 2013 28 May'13

    engine-level encryption

    Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.  Continue Reading

  • May 28, 2013 28 May'13

    MyDiamo

    MyDiamo is database encryption software for MySQL that runs on virtually all platforms that MySQL supports, including Linux, UNIX and Windows.    Continue Reading

  • May 23, 2013 23 May'13

    flat address space

    1. A flat address space is a set of addresses arranged on a single level. It contrasts with a hierarchical address space, which is organized in subgroups. 2. In computer memory, a flat address space refers to a method of allocation in which each ...  Continue Reading

  • May 22, 2013 22 May'13

    push advertising

    Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards. Online examples of push advertising include ...  Continue Reading

  • May 21, 2013 21 May'13

    storage container

    A storage container is a defined, specific location in high-volume storage. It resembles a folder (or directory) in a computer's file system, although there are some differences in the way files are handled.  Continue Reading

  • May 21, 2013 21 May'13

    Amazon Web Services (AWS)

    Amazon Web Services (AWS) is a comprehensive, evolving cloud computing platform provided by Amazon.com. Web services are sometimes called cloud services or remote computing services. The first AWS offerings were launched in 2006 to provide online ...  Continue Reading

  • May 17, 2013 17 May'13

    content marketing

    Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising. The essence of good content marketing is that it offers something the viewer ...  Continue Reading

  • May 16, 2013 16 May'13

    native advertising

    Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement. Although native content is often informational rather than...  Continue Reading

  • May 16, 2013 16 May'13

    dot com disclosures (.com disclosures)

    The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities. The FTC's original document "Dot Com Disclosures: Information About Online Advertising," issued in May 2000, dealt ...  Continue Reading

  • May 14, 2013 14 May'13

    four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all ...  Continue Reading

  • May 10, 2013 10 May'13

    passive cooling

    Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating. That approach contrasts with active cooling, which involves using fans in preference to slowing the ...  Continue Reading

  • May 10, 2013 10 May'13

    active cooling

    Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat.  Continue Reading

  • May 10, 2013 10 May'13

    ElasticSearch

    ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close