Browse Definitions:
  • November 29, 2014 29 Nov'14

    Apache Kafka

    Apache Kafka is a distributed publish-subscribe messaging system designed to replace traditional message brokers.  Continue Reading

  • November 29, 2014 29 Nov'14

    agentless

    Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.  Continue Reading

  • November 29, 2014 29 Nov'14

    Ethernet hard drive

    An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.  Continue Reading

  • November 29, 2014 29 Nov'14

    XKeyscore

    XKeyscore (XKS) is the front end search engine interface that interacts with all NSA  federated databases for the collected Internet traffic, communicated data and phone metadata of private citizens.  Continue Reading

  • November 28, 2014 28 Nov'14

    Unified Functioning Testing Certification

    Unified Functional Testing (UFT) Certification is a Hewlett Packard Enteprise program designed to ensure that trained IT professionals have comprehensive knowledge of HP’s testing automation software.  Continue Reading

  • November 28, 2014 28 Nov'14

    long-tail intrusion

    Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and continued by downloading new code by means such as ...  Continue Reading

  • November 28, 2014 28 Nov'14

    bioprinting

    Although bioprinting is still in the experimental stage and is currently used primarily in scientific study rather than applied science, the possibility of creating functional replacement tissues or organs could one day transform medical treatment.  Continue Reading

  • November 28, 2014 28 Nov'14

    breach detection system (BDS)

    Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS to protect against the variety of advanced threats, ...  Continue Reading

  • November 28, 2014 28 Nov'14

    attack surface

    An attack surface is the total sum of the vulnerabilities in a given computing device or network that are accessible to a hacker. Anyone trying to break into a system generally starts by scanning the target’s attack surface for possible attack ...  Continue Reading

  • November 27, 2014 27 Nov'14

    transparency

    Transparency, in the context of governance, means being open and honest in all official activities. The implication is that all activities are scrupulous enough that they could bear public scrutiny.  Continue Reading

  • November 27, 2014 27 Nov'14

    accountability

    Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken). Accountability and transparency are generally considered the two main pillars of good corporate governance.  Continue Reading

  • November 27, 2014 27 Nov'14

    Cyber Monday

    Cyber Monday is a marketing event created to promote online sales. The day falls on the Monday after Black Friday, which directly follows American Thanksgiving Day.  Continue Reading

  • November 25, 2014 25 Nov'14

    NCR (no country redirect)

    An explanation of the NCR (no country redirect) search parameter. This definition of NCR explains how Google search redirect works and how you can prevent the search engine from redirecting to your country.  Continue Reading

  • November 24, 2014 24 Nov'14

    burnout

    Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.  Continue Reading

  • November 24, 2014 24 Nov'14

    confidentiality, integrity, and availability (CIA triad)

    Confidentiality, integrity, and availability, known as the CIA triad, is a model designed to guide information security practices and policies within an organization. Elements of the CIA triad are intended to ensure that data cannot be accessed by ...  Continue Reading

  • November 20, 2014 20 Nov'14

    micromanagement

    Micromanagement is an approach to overseeing staff that is characterized by a need to control the actions of employees beyond what is useful or effective.  Continue Reading

  • November 20, 2014 20 Nov'14

    semi-structured data

    Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw ...  Continue Reading

  • November 18, 2014 18 Nov'14

    recommendation engine

    Recommendation engines are common among online retail websites, such as Amazon. Also known as recommender systems, these applications suggest products (or something else a visitor might search for, like books or videos) based on data gathered about ...  Continue Reading

  • November 17, 2014 17 Nov'14

    Twitter essay

    A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets. Twitter essays are created, read and developed in real time; the accumulated tweets may be assembled on a site ...  Continue Reading

  • November 11, 2014 11 Nov'14

    third party

    A third party is an entity that is involved in some way in an interaction that is primarily between two other entities. The third party may or may not be officially a part of the transaction between the two primary entities (known as the first party...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close