Browse Definitions:
  • January 30, 2015 30 Jan'15

    just-in-time manufacturing (JIT manufacturing)

    Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production ...  Continue Reading

  • January 29, 2015 29 Jan'15

    theory of relativity

    Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, ...  Continue Reading

  • January 29, 2015 29 Jan'15

    tilde

    A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~. It's a special typographic character found on most keyboards that means various things, depending on the context.  Continue Reading

  • January 29, 2015 29 Jan'15

    critical path method (CPM)

    The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects. Since that time the CPM has been adapted to other fields including hardware and software product research and development.  Continue Reading

  • January 29, 2015 29 Jan'15

    use case diagram (UML use case diagram)

    A use case is a methodology used in system analysis to identify, clarify, and organize system requirements; a use case diagram is a graphic depiction of the interactions among the elements of a system.  Continue Reading

  • January 28, 2015 28 Jan'15

    social engineering penetration testing

    Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management. The purpose is to ascertain the company's vulnerability to social engineering exploits.  Continue Reading

  • January 27, 2015 27 Jan'15

    network attack surface

    Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or ...  Continue Reading

  • January 27, 2015 27 Jan'15

    software attack surface

    The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user. The more surface there is, the better the chance an attacker or a piece of malware can use ...  Continue Reading

  • January 27, 2015 27 Jan'15

    physical attack surface

    The physical attack surface is the totality of the security vulnerabilities in a given system that are available to an attacker in the same location as the target.  Continue Reading

  • January 27, 2015 27 Jan'15

    social engineering attack surface

    Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful. The social engineering attack surface is the totality of an ...  Continue Reading

  • January 26, 2015 26 Jan'15

    cloud robotics

    Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.  Continue Reading

  • January 23, 2015 23 Jan'15

    Faraday constant

    Faraday's constant, symbolized by the italic uppercase letter F, is the physical constant representing the electric charge in a mole. The unit is named for Michael Faraday, an early 19th century inventor of the electrical motor.  Continue Reading

  • January 23, 2015 23 Jan'15

    farad (F)

    The farad is the standard international unit of capacitance. Both the farad and Faraday's constant are symbolized by the capital letter F; however they are different. Faraday's constant is a measure of the amount of electrical charge in a single ...  Continue Reading

  • January 22, 2015 22 Jan'15

    cyberheist

    A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly. Cyberheists differ in terms of the target and method of operation and can ...  Continue Reading

  • January 22, 2015 22 Jan'15

    vision-correcting display

    A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses. The distortion makes it possible for users to view the display without wearing glasses or contact lenses.  Continue Reading

  • January 21, 2015 21 Jan'15

    Intel Curie

    Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE. The SoC is the size of a shirt button but includes everything required to provide compute power for wearable devices.  Continue Reading

  • January 21, 2015 21 Jan'15

    non-profit organization (NPO)

    A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization. Non-profit organizations are often used for trusts, cooperatives,...  Continue Reading

  • January 19, 2015 19 Jan'15

    IFrame (Inline Frame)

    The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. Although an IFrame behaves like an inline image, it can be configured with its own scrollbar independent of the surrounding ...  Continue Reading

  • January 16, 2015 16 Jan'15

    ARM processor

    An ARM processor is any of several 32-bit RISC (reduced instruction set computer) microprocessors developed by Advanced RISC Machines, Ltd. The ARM architecture was originally developed by Acorn Computers in the 1980s.  Continue Reading

  • January 16, 2015 16 Jan'15

    quantum theory

    Quantum theory is the theoretical basis of modern physics explaining the nature and behavior of matter and energy on the atomic and subatomic level, sometimes called quantum mechanics or quantum physics. This definition provides an introduction to ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close