Browse Definitions:
  • October 31, 2014 31 Oct'14

    backup and recovery testing

    A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.  Continue Reading

  • October 31, 2014 31 Oct'14

    employee advocacy

    Employee advocacy is the promotion of an organization by its staff members. A business may ask employees to actively promote the organization, often through social media, as an element of their jobs. However, the most compelling employee advocacy ...  Continue Reading

  • October 31, 2014 31 Oct'14

    Likert scale

    The Likert scale is a commonly used survey tool that requests a quantification of some variable from a range of responses. An opinion poll, for example, might provide a series of statements and five responses ranging from "I strongly agree" to "I ...  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid immersion cooling

    One of the simplest examples of liquid immersion cooling is taking a standard air-cooled computer's hardware and submerging it in mineral oil. Mineral, oil being nonconductive and noncapacitive, poses no threat to the electronics.  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid cooling

    Liquid cooling is the reduction of heat in electronic and mechanical devices through exploiting the properties of liquids. Liquid cooling is a firmly established cooling method in many current technologies. Automobiles, mainframes and the systems ...  Continue Reading

  • October 30, 2014 30 Oct'14

    POODLE attack

    A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit.  Continue Reading

  • October 30, 2014 30 Oct'14

    IceWarp

    IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.  Continue Reading

  • October 28, 2014 28 Oct'14

    digital assistant

    A digital assistant is an application program that can understand natural human language and complete electronic tasks for the end user.  Continue Reading

  • October 28, 2014 28 Oct'14

    Schrodinger's cat

    Schrodinger's cat explained: This definition describes Schrodinger's famous thought experiment and its place in quantum theory.  Continue Reading

  • October 27, 2014 27 Oct'14

    automatic backup

    Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction. Because data can be lost through equipment failure, human error and other adverse events, consistent...  Continue Reading

  • October 27, 2014 27 Oct'14

    agentless backup

    Agentless backup is the replication of data that is performed without the use of a service, daemon or process (AKA an agent) running in the background to facilitate the process. Access may be conducted through a number of different Internet ...  Continue Reading

  • October 23, 2014 23 Oct'14

    Iometer

    Iometer allows users to set custom input/output profiles to simulate different application workloads for testing. Iometer is also a useful benchmarking tool for storage and is often used for storage solution performance testing as well as for ...  Continue Reading

  • October 22, 2014 22 Oct'14

    Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or ...  Continue Reading

  • October 22, 2014 22 Oct'14

    business risk

    A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negative events over which the organization has no control,...  Continue Reading

  • October 22, 2014 22 Oct'14

    counter-Googling

    Counter-Googling is the use of the search engine to find information about the party that would traditionally be the searcher (such as a potential customer) by a party that would ordinarily be the subject of the search, such as a business. Common ...  Continue Reading

  • October 20, 2014 20 Oct'14

    pay for privacy

    Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy service may be the only option offered. A cloud storage ...  Continue Reading

  • October 16, 2014 16 Oct'14

    Chief Privacy Officer (CPO)

    A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access. Other elements of the CPO job include maintaining a comprehensive and current ...  Continue Reading

  • October 15, 2014 15 Oct'14

    smartphone sensor

    A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.  Continue Reading

  • October 09, 2014 09 Oct'14

    Hewlett-Packard (HP)

    HP (Hewlett-Packard) is a prominent IT company based in Palo Alto, California. The company's products include PCs and other computing devices, enterprise and industry standard servers, related storage devices, networking products, software and a ...  Continue Reading

  • October 07, 2014 07 Oct'14

    data loss prevention (DLP)

    Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network. The term is also used to describe software products that help a network administrator control ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close