Browse Definitions:
  • February 28, 2014 28 Feb'14

    Windows 3.1

    Windows 3.1 was the 4th version of Microsoft’s GUI-based operating system, released in 1993. 3.1 was a paid sub-release -- Windows 3.0 had been so popular that Microsoft decided to charge for the modified software rather than offer it as a free ...  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 3.0

    Windows 3.0 was the 3rd version of Microsoft’s GUI-based operating system, released in 1990. This version of Windows was highly successful upon initial release.  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 2.0

    Windows 2.0 was the 2nd version of Microsoft’s GUI-based operating system, released in 1987. Windows 2.0 was faster and more stable than Windows 1.0. This Windows version also had more in common still with both the LISA and future versions of ...  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 1.0

    Windows 1.0 was the first of Microsoft’s GUI-based operating systems, released in 1985. Like many early versions of Windows, the OS was essentially a program that ran on top of DOS. The product release didn’t actually occur until two years after ...  Continue Reading

  • February 26, 2014 26 Feb'14

    sub-release

    A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version. A developer or vendor may choose to do a sub-release for a number of reasons.  Continue Reading

  • February 26, 2014 26 Feb'14

    instruction set

    An instruction set is a group of commands for a CPU in machine language. The term can refer to all possible instructions for a CPU or a subset of instructions to enhance its performance in certain situations.  Continue Reading

  • February 26, 2014 26 Feb'14

    expanded memory

    Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.  Continue Reading

  • February 26, 2014 26 Feb'14

    extended memory

    Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.  Continue Reading

  • February 26, 2014 26 Feb'14

    Intel 80486

    Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor. The 80486 was capable of over 40 million instructions per second (MIPS) and offered roughly twice the performance of the 386.  Continue Reading

  • February 26, 2014 26 Feb'14

    Intel 80386

    Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985. The 386 followed Intel’s 8086 and 80286 processors and predated the 80486.  Continue Reading

  • February 26, 2014 26 Feb'14

    standards organization

    A standards organization, sometimes referred to as a standards body, is an organization with authority to endorse official standards for given applications.  Continue Reading

  • February 26, 2014 26 Feb'14

    de jure standard

    A de jure standard is a technology, method or product that has been officially endorsed for a given application. De jure, from Medieval Latin, means from law. The term refers not only to legally protected or enforced standards but also to those that...  Continue Reading

  • February 26, 2014 26 Feb'14

    de facto standard

    A de facto standard is something that is used so widely that it is considered a standard for a given application although it has no official status. De facto, from Medieval Latin, means from fact.  Continue Reading

  • February 20, 2014 20 Feb'14

    ad hoc

    Ad hoc is an adjective used to describe things that are created on the spot, usually for a single use. A Latin term that translates literally as “for this,” ad hoc implies innovation, creativity and spontaneity. The term is widely applied in ...  Continue Reading

  • February 20, 2014 20 Feb'14

    market culture

    A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees. The market model is the most aggressive and capitalistic of the four common corporate culture ...  Continue Reading

  • February 20, 2014 20 Feb'14

    clan culture

    A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values. Clan cultures are the most team-oriented and the least competitive of the four main corporate culture models.  Continue Reading

  • February 20, 2014 20 Feb'14

    hierarchical corporate culture

    A hierarchical corporate culture is an organizational model based on clearly defined corporate levels and structures. A hierarchy is an organizational structure in which items are ranked according to levels of importance. Hierarchies depend upon ...  Continue Reading

  • February 20, 2014 20 Feb'14

    autodialer

    An autodialer is a software program that automatically dials telephone numbers from a list or a database.  Continue Reading

  • February 20, 2014 20 Feb'14

    robocall

    A robocall is an automated telephone call initiated by an autodialer for delivery of a prerecorded message. Robocalls are used for a wide variety of communications including public service announcements, appointment reminders, marketing, advertising...  Continue Reading

  • February 20, 2014 20 Feb'14

    adhocracy

    Adhocracy is a business management and corporate culture model based the ability to adapt quickly to changing conditions. Ad hoc is a Latin term meaning "for this," which translates to "for this special purpose" and also, by extension, improvised or...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close