Browse Definitions:
  • July 31, 2013 31 Jul'13

    heads-up display (HUD)

    A heads-up display (HUD) is a transparent or miniaturized display technology that does not require users to shift their gaze from where they are naturally looking. A HUD should not obstruct the user's view. This is typically achieved by the use of ...  Continue Reading

  • July 31, 2013 31 Jul'13

    Chinese wall

    A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information. The concept of the Chinese wall is employed in a wide variety of environments, including the financial industry, business, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    iOS 7

    iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch. Like earlier versions, iOS 7 is based on Macintosh OS X and supports multi-touch gesture recognition for user actions including pinching, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    x86-64

    x86-64 is a 64-bit processing technology developed by AMD that debuted with the Opteron and Athlon 64 processor. x86-64 is also known as x64 and AMD64.  Continue Reading

  • July 30, 2013 30 Jul'13

    reference data

    Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.  Continue Reading

  • July 30, 2013 30 Jul'13

    transactional data

    Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work (such as database updating) that is treated as a unit for ...  Continue Reading

  • July 30, 2013 30 Jul'13

    corporate culture

    Corporate culture is the pervasive values, beliefs and attitudes that characterize a company. An organization's corporate culture may be articulated in its mission statement or vision statement.  Continue Reading

  • July 19, 2013 19 Jul'13

    Joomla!

    Joomla! is a free open source website development and content management (CMS) platform. Like other content management systems, Joomla! removes much of the technical aspect of setting up and running a website.  Continue Reading

  • July 18, 2013 18 Jul'13

    dark data center

    A dark data center is a facility that is almost exclusively administered remotely, through lights-out management (LOM). Common tasks that would ordinarily require physical access are automated. Humans have to enter the data center only in rare or ...  Continue Reading

  • July 18, 2013 18 Jul'13

    dark storage

    Dark storage is allocated but unused storage capacity. Although configured and mapped to servers, dark storage is not presented as file systems or volumes to users and applications.  Continue Reading

  • July 18, 2013 18 Jul'13

    zettaflops

    Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS). The zetta in zettaflop represents 10 to the 21st power -- 10 multiplied by itself 21 times (which equals a septillion).  Continue Reading

  • July 18, 2013 18 Jul'13

    Encyclopedia of Ethical Failure (EEF)

    The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees. In general terms, an ethical failure is a poor decision that intentionally or unintentionally ...  Continue Reading

  • July 15, 2013 15 Jul'13

    creative destruction

    Creative destruction is a process through which something new brings about the demise of whatever existed before it.  The term is used in a variety of areas including economics, corporate governance, product development, technology and marketing.  Continue Reading

  • July 15, 2013 15 Jul'13

    business cycle

    The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy. The stage of the cycle is identified by fluctuations in gross domestic product (GDP), production, trade and activity in the ...  Continue Reading

  • July 14, 2013 14 Jul'13

    golden parachute

    A golden parachute is a severance agreement that provides an executive with a substantial package upon termination, usually in the event of a takeover or merger. Such a package might include severance pay, bonuses and stock options, among other ...  Continue Reading

  • July 11, 2013 11 Jul'13

    ITU X.225 (ISO 8327)

    ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.  The ITU X.225 protocol specification is a recommendation of the International Telecommunication Union (ITU).  Continue Reading

  • July 11, 2013 11 Jul'13

    executive sponsor

    An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.  Continue Reading

  • July 11, 2013 11 Jul'13

    lifestyle business

    A lifestyle business is one that is geared toward supporting the owner’s income and personal requirements rather than maximizing revenue. The emphasis for such a business is usually on creating a sustainable and pleasant work/life balance.  Continue Reading

  • July 10, 2013 10 Jul'13

    severance package

    A severance package is the contracted pay and benefits provided to an employee whose job is terminated. Severance agreements specify what will be provided, as well as terms and conditions under which the employee might forfeit some or all of his ...  Continue Reading

  • July 10, 2013 10 Jul'13

    endpoint device

    An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close