Browse Definitions:
  • June 28, 2013 28 Jun'13

    social entrepreneur

    A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.   Continue Reading

  • June 27, 2013 27 Jun'13

    mathematical induction

    Mathematical induction is a a specialized form of deductive reasoning used to prove a fact about all the elements in an infinite set by performing a finite number of steps.   Continue Reading

  • June 27, 2013 27 Jun'13

    object storage device (OSD)

    An object-based storage device or object storage device (OBSD or OSD) is a computer storage system that organizes data into containers called objects that a user or application determines are related. The objects reside in a flat address space where...  Continue Reading

  • June 27, 2013 27 Jun'13

    object ID (OID)

    An object identifier (OID) is an unambiguous, long-term name for any type of object or entity. The OID mechanism finds application in diverse scenarios, particularly in security.  Continue Reading

  • June 27, 2013 27 Jun'13

    cloud cost analysis tool

    A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations. The tool provides valuable insight into how a business uses its cloud computing resources in general.  Continue Reading

  • June 27, 2013 27 Jun'13

    Access Network Query Protocol (ANQP)

    The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot. The ANQP communicates metadata that is useful in a mobile device's network selection ...  Continue Reading

  • June 27, 2013 27 Jun'13

    802.11u

    802.11u is an amendment to the IEEE 802.11 WLAN standards that provides for connection to external networks using common wireless devices such as smartphones and tablet PCs. An 802.11u-capable device can take advantage of Hot Spot 2.0, also called ...  Continue Reading

  • June 27, 2013 27 Jun'13

    follow-the-sun data center

    A follow-the-sun data center is a data center that moves workloads to different geographic locations to more efficiently balance resources and demand. One method of implementing follow-the-sun computing involves constantly moving virtual machines (...  Continue Reading

  • June 27, 2013 27 Jun'13

    locked down device (LDD)

    A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.  Continue Reading

  • June 27, 2013 27 Jun'13

    data store

    A data store is a repository for persistently storing collections of data, such as a database, a file system or a directory.  Continue Reading

  • June 27, 2013 27 Jun'13

    Word of the Day RSS feed is moving!

    As of July 1, the Word of the Day RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/Word-of-the-Day.xml  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT news roundup RSS feed is moving!

    As of July 1, the Enterprise IT news roundup RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT tips and expert advice RSS feed is moving!

    As of July 1, the Enterprise IT tips and expert advice RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel network

    An angel network is a group of angel investors who have organized to invest collectively, operate more effectively and provide mutual support.  Continue Reading

  • June 26, 2013 26 Jun'13

    seed capital

    Seed capital is the funding required to get a new business started. The first funding, which usually comes from the business owner(s) and perhaps friends and family, supports preliminary activities such as market research and business plan ...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel investor

    An angel investor, sometimes just referred to as an angel, is an individual with private resources who invests in a company or product for personal reasons.  Continue Reading

  • June 26, 2013 26 Jun'13

    compatibility

    Compatibility is the capacity for two systems to work together without having to be altered to do so. Compatible software applications use the same data formats. For example, if word processor applications are compatible, users should be able to ...  Continue Reading

  • June 21, 2013 21 Jun'13

    FatDB

    FatDB is a .Net NoSQL database that can integrates Map Reduce, a work queue, a file management system, high-speed cache and application services within a single implementation.  Continue Reading

  • June 20, 2013 20 Jun'13

    solid oxide fuel cell (SOFC)

    A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte. Ordinarily, fuel cells are powered by substances that are gases or liquids at room temperature, ...  Continue Reading

  • June 19, 2013 19 Jun'13

    Internet TV

    Internet TV (ITV) is generally-available content distributed over the Internet. Unlike IPTV (Internet Protocol television), which is distributed over proprietary networks, ITV is available wherever a broadband connection exists.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close