Browse Definitions:
  • October 31, 2014 31 Oct'14

    backup and recovery testing

    A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.  Continue Reading

  • October 31, 2014 31 Oct'14

    employee advocacy

    Employee advocacy is the promotion of an organization by its staff members. A business may ask employees to actively promote the organization, often through social media, as an element of their jobs. However, the most compelling employee advocacy ...  Continue Reading

  • October 31, 2014 31 Oct'14

    Likert scale

    The Likert scale is a commonly used survey tool that requests a quantification of some variable from a range of responses. An opinion poll, for example, might provide a series of statements and five responses ranging from "I strongly agree" to "I ...  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid immersion cooling

    One of the simplest examples of liquid immersion cooling is taking a standard air-cooled computer's hardware and submerging it in mineral oil. Mineral, oil being nonconductive and noncapacitive, poses no threat to the electronics.  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid cooling

    Liquid cooling is the reduction of heat in electronic and mechanical devices through exploiting the properties of liquids. Liquid cooling is a firmly established cooling method in many current technologies. Automobiles, mainframes and the systems ...  Continue Reading

  • October 30, 2014 30 Oct'14

    POODLE attack

    A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit.  Continue Reading

  • October 30, 2014 30 Oct'14


    IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.  Continue Reading

  • October 28, 2014 28 Oct'14

    digital assistant

    A digital assistant is an application program that can understand natural human language and complete electronic tasks for the end user.  Continue Reading

  • October 27, 2014 27 Oct'14

    automatic backup

    Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction. Because data can be lost through equipment failure, human error and other adverse events, consistent...  Continue Reading

  • October 27, 2014 27 Oct'14

    agentless backup

    Agentless backup is the replication of data that is performed without the use of a service, daemon or process (AKA an agent) running in the background to facilitate the process. Access may be conducted through a number of different Internet ...  Continue Reading

  • October 23, 2014 23 Oct'14


    Iometer allows users to set custom input/output profiles to simulate different application workloads for testing. Iometer is also a useful benchmarking tool for storage and is often used for storage solution performance testing as well as for ...  Continue Reading

  • October 22, 2014 22 Oct'14

    Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or ...  Continue Reading

  • October 22, 2014 22 Oct'14

    business risk

    A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negative events over which the organization has no control,...  Continue Reading

  • October 22, 2014 22 Oct'14


    Counter-Googling is the use of the search engine to find information about the party that would traditionally be the searcher (such as a potential customer) by a party that would ordinarily be the subject of the search, such as a business. Common ...  Continue Reading

  • October 20, 2014 20 Oct'14

    pay for privacy

    Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy service may be the only option offered. A cloud storage ...  Continue Reading

  • October 16, 2014 16 Oct'14

    Chief Privacy Officer (CPO)

    A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access. Other elements of the CPO job include maintaining a comprehensive and current ...  Continue Reading

  • October 15, 2014 15 Oct'14

    smartphone sensor

    A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.  Continue Reading

  • October 09, 2014 09 Oct'14

    Hewlett-Packard (HP)

    HP (Hewlett-Packard) is a prominent IT company based in Palo Alto, California. The company's products include PCs and other computing devices, enterprise and industry standard servers, related storage devices, networking products, software and a ...  Continue Reading

  • October 07, 2014 07 Oct'14

    data loss prevention (DLP)

    Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network. The term is also used to describe software products that help a network administrator control ...  Continue Reading

  • October 06, 2014 06 Oct'14

    respawning cookie

    A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again. A 2009 study,” Flash Cookies and Privacy,” showed that cookies ...  Continue Reading



  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.


  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.


  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...


  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...