Browse Definitions:
  • January 30, 2015 30 Jan'15

    just-in-time manufacturing (JIT manufacturing)

    Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production ...  Continue Reading

  • January 29, 2015 29 Jan'15

    theory of relativity

    Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, ...  Continue Reading

  • January 29, 2015 29 Jan'15

    tilde

    A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~. It's a special typographic character found on most keyboards that means various things, depending on the context.  Continue Reading

  • January 29, 2015 29 Jan'15

    critical path method (CPM)

    The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects. Since that time the CPM has been adapted to other fields including hardware and software product research and development.  Continue Reading

  • January 29, 2015 29 Jan'15

    use case diagram (UML use case diagram)

    A use case is a methodology used in system analysis to identify, clarify, and organize system requirements; a use case diagram is a graphic depiction of the interactions among the elements of a system.  Continue Reading

  • January 28, 2015 28 Jan'15

    social engineering penetration testing

    Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management. The purpose is to ascertain the company's vulnerability to social engineering exploits.  Continue Reading

  • January 27, 2015 27 Jan'15

    network attack surface

    Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or ...  Continue Reading

  • January 27, 2015 27 Jan'15

    software attack surface

    The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user. The more surface there is, the better the chance an attacker or a piece of malware can use ...  Continue Reading

  • January 27, 2015 27 Jan'15

    physical attack surface

    The physical attack surface is the totality of the security vulnerabilities in a given system that are available to an attacker in the same location as the target.  Continue Reading

  • January 27, 2015 27 Jan'15

    social engineering attack surface

    Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful. The social engineering attack surface is the totality of an ...  Continue Reading

  • January 26, 2015 26 Jan'15

    cloud robotics

    Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.  Continue Reading

  • January 23, 2015 23 Jan'15

    Faraday constant

    Faraday's constant, symbolized by the italic uppercase letter F, is the physical constant representing the electric charge in a mole. The unit is named for Michael Faraday, an early 19th century inventor of the electrical motor.  Continue Reading

  • January 23, 2015 23 Jan'15

    farad (F)

    The farad is the standard international unit of capacitance. Both the farad and Faraday's constant are symbolized by the capital letter F; however they are different. Faraday's constant is a measure of the amount of electrical charge in a single ...  Continue Reading

  • January 22, 2015 22 Jan'15

    cyberheist

    A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly. Cyberheists differ in terms of the target and method of operation and can ...  Continue Reading

  • January 22, 2015 22 Jan'15

    vision-correcting display

    A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses. The distortion makes it possible for users to view the display without wearing glasses or contact lenses.  Continue Reading

  • January 21, 2015 21 Jan'15

    Intel Curie

    Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE. The SoC is the size of a shirt button but includes everything required to provide compute power for wearable devices.  Continue Reading

  • January 21, 2015 21 Jan'15

    non-profit organization (NPO)

    A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization. Non-profit organizations are often used for trusts, cooperatives,...  Continue Reading

  • January 19, 2015 19 Jan'15

    IFrame (Inline Frame)

    The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. Although an IFrame behaves like an inline image, it can be configured with its own scrollbar independent of the surrounding ...  Continue Reading

  • January 16, 2015 16 Jan'15

    ARM processor

    An ARM processor is any of several 32-bit RISC (reduced instruction set computer) microprocessors developed by Advanced RISC Machines, Ltd. The ARM architecture was originally developed by Acorn Computers in the 1980s.  Continue Reading

  • January 16, 2015 16 Jan'15

    quantum theory

    Quantum theory is the theoretical basis of modern physics explaining the nature and behavior of matter and energy on the atomic and subatomic level, sometimes called quantum mechanics or quantum physics. This definition provides an introduction to ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close