Browse Definitions:
  • June 30, 2014 30 Jun'14

    database abstraction layer

    A database abstraction layer is a simplified representation of a database in the form of a written description or a diagram. Abstraction, in general, is the process of taking away or removing characteristics from something in order to reduce it to a...  Continue Reading

  • June 30, 2014 30 Jun'14

    abstraction

    Abstraction (from the Latin abs, meaning away from and trahere, meaning to draw) is the process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.  Continue Reading

  • June 30, 2014 30 Jun'14

    data abstraction

    Data abstraction is the reduction of a particular body of data to a simplified representation of the whole. Abstraction, in general, is the process of taking away or removing characteristics from something in order to reduce it to a set of ...  Continue Reading

  • June 26, 2014 26 Jun'14

    headless server

    A headless server is a computing device without a local interface that is dedicated to providing services to other computers and their users. Servers in large data center environments are often headless.  Continue Reading

  • June 26, 2014 26 Jun'14

    rule of thumb

    A rule of thumb is a principle that is intended to provide general guidance rather than precise direction. The term originally referred to a rough physical measurement, but it has evolved to apply to any kind of broadly applicable and non-specific ...  Continue Reading

  • June 23, 2014 23 Jun'14

    limitation of liability clause

    A limitation of liability clause is the section in a service-level agreement (SLA) that specifies the amounts and types of damages that each party will be obliged to provide to the other in particular circumstances. In a legal context, a liability ...  Continue Reading

  • June 20, 2014 20 Jun'14

    HP Quality Center

    HP Quality Center is Hewlett-Packard’s software quality management product, part of the company’s application lifecycle management software suite. The product is available in entry-level and enterprise-level versions.  Continue Reading

  • June 19, 2014 19 Jun'14

    anode

    An anode is the electrode in a polarized electrical device through which current flows in from an outside circuit. Conversely, a cathode is the eletrode in a polarized electrical device through which current flows out. Cathodes get their name from ...  Continue Reading

  • June 19, 2014 19 Jun'14

    cathode

    A cathode is the metallic electrode through which current flows out in a polarized electrical device. Conversely, an anode is the electrode in a polarized electrical device through which current flows in from an outside circuit. Cathodes get their ...  Continue Reading

  • June 18, 2014 18 Jun'14

    digital divide

    The term 'digital divide' describes the fact that the world can be divided into people who do and people who don't have access to - and the capability to use - modern information technology, such as the telephone, television, or the Internet.  Continue Reading

  • June 17, 2014 17 Jun'14

    botnet sinkhole

    A botnet sinkhole is a target machine used by researchers to gather information about a particular botnet. Sinkholing is the redirection of traffic from its original destination to one specified by the sinkhole owners. The altered destination is ...  Continue Reading

  • June 16, 2014 16 Jun'14

    small data

    Small data is data presented in a volume and format that makes it accessible and actionable. Small data typically provides information that answers a specific question or addresses a specific problem. Examples of small data include baseball scores, ...  Continue Reading

  • June 10, 2014 10 Jun'14

    catfish

    A catfish is someone who creates a false identity online to deceive victims, often as a means of attracting romantic interest. Sometimes a fantasy relationship is the sole purpose of the catfish. Often, however, the intent is either to defraud ...  Continue Reading

  • June 07, 2014 07 Jun'14

    tl;dr (TL;DR)

    TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all. TL;DR is often seen on social media sites, where it usually ...  Continue Reading

  • June 06, 2014 06 Jun'14

    OpenID (OpenID Connect)

    OpenID is an open specification for authentication and single sign-on.  Continue Reading

  • June 04, 2014 04 Jun'14

    Inbox Zero

    Inbox zero is a rigorous approach to email management aimed at keeping the inbox empty -- or almost empty -- at all times.  Continue Reading

  • June 02, 2014 02 Jun'14

    forking (software fork)

    Forking is to take the source code from an open source software program and develop an entirely new program.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close