Browse Definitions:
  • July 31, 2013 31 Jul'13

    heads-up display (HUD)

    A heads-up display (HUD) is a transparent or miniaturized display technology that does not require users to shift their gaze from where they are naturally looking. A HUD should not obstruct the user's view. This is typically achieved by the use of ...  Continue Reading

  • July 31, 2013 31 Jul'13

    Chinese wall

    A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information. The concept of the Chinese wall is employed in a wide variety of environments, including the financial industry, business, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    iOS 7

    iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch. Like earlier versions, iOS 7 is based on Macintosh OS X and supports multi-touch gesture recognition for user actions including pinching, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    x86-64

    x86-64 is a 64-bit processing technology developed by AMD that debuted with the Opteron and Athlon 64 processor. x86-64 is also known as x64 and AMD64.  Continue Reading

  • July 30, 2013 30 Jul'13

    reference data

    Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.  Continue Reading

  • July 30, 2013 30 Jul'13

    transactional data

    Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work (such as database updating) that is treated as a unit for ...  Continue Reading

  • July 30, 2013 30 Jul'13

    corporate culture

    Corporate culture is the pervasive values, beliefs and attitudes that characterize a company. An organization's corporate culture may be articulated in its mission statement or vision statement.  Continue Reading

  • July 19, 2013 19 Jul'13

    Joomla!

    Joomla! is a free open source website development and content management (CMS) platform. Like other content management systems, Joomla! removes much of the technical aspect of setting up and running a website.  Continue Reading

  • July 18, 2013 18 Jul'13

    dark data center

    A dark data center is a facility that is almost exclusively administered remotely, through lights-out management (LOM). Common tasks that would ordinarily require physical access are automated. Humans have to enter the data center only in rare or ...  Continue Reading

  • July 18, 2013 18 Jul'13

    dark storage

    Dark storage is allocated but unused storage capacity. Although configured and mapped to servers, dark storage is not presented as file systems or volumes to users and applications.  Continue Reading

  • July 18, 2013 18 Jul'13

    zettaflops

    Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS). The zetta in zettaflop represents 10 to the 21st power -- 10 multiplied by itself 21 times (which equals a septillion).  Continue Reading

  • July 18, 2013 18 Jul'13

    Encyclopedia of Ethical Failure (EEF)

    The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees. In general terms, an ethical failure is a poor decision that intentionally or unintentionally ...  Continue Reading

  • July 15, 2013 15 Jul'13

    creative destruction

    Creative destruction is a process through which something new brings about the demise of whatever existed before it.  The term is used in a variety of areas including economics, corporate governance, product development, technology and marketing.  Continue Reading

  • July 15, 2013 15 Jul'13

    business cycle

    The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy. The stage of the cycle is identified by fluctuations in gross domestic product (GDP), production, trade and activity in the ...  Continue Reading

  • July 14, 2013 14 Jul'13

    golden parachute

    A golden parachute is a severance agreement that provides an executive with a substantial package upon termination, usually in the event of a takeover or merger. Such a package might include severance pay, bonuses and stock options, among other ...  Continue Reading

  • July 11, 2013 11 Jul'13

    ITU X.225 (ISO 8327)

    ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.  The ITU X.225 protocol specification is a recommendation of the International Telecommunication Union (ITU).  Continue Reading

  • July 11, 2013 11 Jul'13

    executive sponsor

    An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.  Continue Reading

  • July 11, 2013 11 Jul'13

    lifestyle business

    A lifestyle business is one that is geared toward supporting the owner’s income and personal requirements rather than maximizing revenue. The emphasis for such a business is usually on creating a sustainable and pleasant work/life balance.  Continue Reading

  • July 10, 2013 10 Jul'13

    severance package

    A severance package is the contracted pay and benefits provided to an employee whose job is terminated. Severance agreements specify what will be provided, as well as terms and conditions under which the employee might forfeit some or all of his ...  Continue Reading

  • July 10, 2013 10 Jul'13

    endpoint device

    An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close