Browse Definitions:
  • October 31, 2014 31 Oct'14

    backup and recovery testing

    A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.  Continue Reading

  • October 31, 2014 31 Oct'14

    employee advocacy

    Employee advocacy is the promotion of an organization by its staff members. A business may ask employees to actively promote the organization, often through social media, as an element of their jobs. However, the most compelling employee advocacy ...  Continue Reading

  • October 31, 2014 31 Oct'14

    Likert scale

    The Likert scale is a commonly used survey tool that requests a quantification of some variable from a range of responses. An opinion poll, for example, might provide a series of statements and five responses ranging from "I strongly agree" to "I ...  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid immersion cooling

    One of the simplest examples of liquid immersion cooling is taking a standard air-cooled computer's hardware and submerging it in mineral oil. Mineral, oil being nonconductive and noncapacitive, poses no threat to the electronics.  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid cooling

    Liquid cooling is the reduction of heat in electronic and mechanical devices through exploiting the properties of liquids. Liquid cooling is a firmly established cooling method in many current technologies. Automobiles, mainframes and the systems ...  Continue Reading

  • October 30, 2014 30 Oct'14

    POODLE attack

    A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit.  Continue Reading

  • October 30, 2014 30 Oct'14


    IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.  Continue Reading

  • October 27, 2014 27 Oct'14

    automatic backup

    Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction. Because data can be lost through equipment failure, human error and other adverse events, consistent...  Continue Reading

  • October 27, 2014 27 Oct'14

    agentless backup

    Agentless backup is the replication of data that is performed without the use of a service, daemon or process (AKA an agent) running in the background to facilitate the process. Access may be conducted through a number of different Internet ...  Continue Reading

  • October 23, 2014 23 Oct'14


    Iometer allows users to set custom input/output profiles to simulate different application workloads for testing. Iometer is also a useful benchmarking tool for storage and is often used for storage solution performance testing as well as for ...  Continue Reading

  • October 22, 2014 22 Oct'14

    Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or ...  Continue Reading

  • October 22, 2014 22 Oct'14

    business risk

    A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negative events over which the organization has no control,...  Continue Reading

  • October 22, 2014 22 Oct'14


    Counter-Googling is the use of the search engine to find information about the party that would traditionally be the searcher (such as a potential customer) by a party that would ordinarily be the subject of the search, such as a business. Common ...  Continue Reading

  • October 20, 2014 20 Oct'14

    pay for privacy

    Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy service may be the only option offered. A cloud storage ...  Continue Reading

  • October 16, 2014 16 Oct'14

    Chief Privacy Officer (CPO)

    A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access. Other elements of the CPO job include maintaining a comprehensive and current ...  Continue Reading

  • October 15, 2014 15 Oct'14

    smartphone sensor

    A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.  Continue Reading

  • October 09, 2014 09 Oct'14

    Hewlett-Packard (HP)

    HP (Hewlett-Packard) is a prominent IT company based in Palo Alto, California. The company's products include PCs and other computing devices, enterprise and industry standard servers, related storage devices, networking products, software and a ...  Continue Reading

  • October 07, 2014 07 Oct'14

    data loss prevention (DLP)

    Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network. The term is also used to describe software products that help a network administrator control ...  Continue Reading

  • October 06, 2014 06 Oct'14

    respawning cookie

    A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again. A 2009 study,” Flash Cookies and Privacy,” showed that cookies ...  Continue Reading

  • October 06, 2014 06 Oct'14

    Flash cookie

    Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.