Browse Definitions:
  • September 30, 2014 30 Sep'14

    standard operating environment (SOE)

    Standard operating environments (SOE) simplify desktop deployment and network administration within an organization. SOEs are usually deployed through disk images that typically include the OS, its standard configuration, associated service packs, ...  Continue Reading

  • September 30, 2014 30 Sep'14

    digital due process

    Digital due process is an adaptation and extension of that legal concept to protect the rights of individuals with regard to online communications. Due process, in general, is the requirement that established laws and standards of behavior must be ...  Continue Reading

  • September 29, 2014 29 Sep'14

    due process

    Due process is a legal principle designed to protect the rights of citizens to fair treatment at the hands of the government. The concept is enacted in the United States Constitution. Although England does not have the same principle legislated, ...  Continue Reading

  • September 29, 2014 29 Sep'14

    first follower theory

    First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general ...  Continue Reading

  • September 24, 2014 24 Sep'14

    employee monitoring

    Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members. Monitoring methods include keystroke logging, wiretapping, GPS tracking and Internet monitoring, ...  Continue Reading

  • September 19, 2014 19 Sep'14

    Trusted Platform Module (TPM)

    A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.  Continue Reading

  • September 18, 2014 18 Sep'14

    IT asset lifecycle

    The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership. An IT asset is any company-owned information, software or hardware that is used in the course of business. ...  Continue Reading

  • September 18, 2014 18 Sep'14

    predictive text

    Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.  Continue Reading

  • September 18, 2014 18 Sep'14

    QuickType

    QuickType is a predictive text feature released with Apple's iOS 8 that uses machine learning to incorporate the user's vocabulary into its dictionary and so improve its capacity and accuracy. The technology can learn different manners of speech to ...  Continue Reading

  • September 17, 2014 17 Sep'14

    virtual honeypot

    A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed...  Continue Reading

  • September 17, 2014 17 Sep'14

    Internet of Things

     Continue Reading

  • September 16, 2014 16 Sep'14

    Google Hack Honeypot (GHH)

    A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. Google hacking (sometimes called Google dorking) is the use of advanced search ...  Continue Reading

  • September 12, 2014 12 Sep'14

    malware testing

    Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications. Malicious software developers want their products to meet a lot of the same ...  Continue Reading

  • September 12, 2014 12 Sep'14

    content-addressed memory (CAM)

    Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications. CAM is capable of searching its entire contents in a single clock cycle. It does that by pairing the SRAM-based memory...  Continue Reading

  • September 11, 2014 11 Sep'14

    virtual assistant

    A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user. Virtual assistants have existed in concept for years. Some may recall the 1970s series Knight Rider in...  Continue Reading

  • September 11, 2014 11 Sep'14

    cloud-to-cloud backup

    Cloud-to-cloud backup is the practice of copying data that is stored on one cloud backup service to another cloud. Third-party cloud backup has gained popularity with small offices and home users because of its convenience: It takes the management ...  Continue Reading

  • September 11, 2014 11 Sep'14

    laser-switched magnetic storage

    Laser-switched magnetic storage is a technology that uses lasers to switch the magnetic polarity of ferromagnetic nanoislands on media, enabling speeds up to 1000 times greater than those of  conventional hard drives.  Continue Reading

  • September 11, 2014 11 Sep'14

    vulnerability

    A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attack vectors, through which an intruder could run code ...  Continue Reading

  • September 10, 2014 10 Sep'14

    vulnerability management planning

    Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack ...  Continue Reading

  • September 09, 2014 09 Sep'14

    translation lookaside buffer (TLB)

    A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval. When a virtual memory address is referenced by a program, the search starts in the CPU. First, ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

SearchSolidStateStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close