Browse Definitions:
  • October 30, 2015 30 Oct'15

    holographic display

    A holographic display is a display that uses coherent light, such as that created by laser, to create a three-dimensional (3D) image in space.  Continue Reading

  • October 29, 2015 29 Oct'15

    format war

    A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.  Continue Reading

  • October 29, 2015 29 Oct'15

    Freedom on the Net report

    Freedom on the Net is an annual report on the extent to which people in countries around the globe can publish and access Internet content without undue restriction and have their rights respected.  Continue Reading

  • October 28, 2015 28 Oct'15

    kanban

    Kanban is a visual signal that's used to trigger an action. At its simplest, kanban is a card with an inventory number that’s attached to a part.  Continue Reading

  • October 28, 2015 28 Oct'15

    liquid computing

    Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop before leaving the office and start from the same point ...  Continue Reading

  • October 27, 2015 27 Oct'15

    federated search (universal search)

    Federated search is an approach to information retrieval that aggregates query results from multiple information sources. Federated search may also be called universal search.  Continue Reading

  • October 27, 2015 27 Oct'15

    witching hour

    Witching hour, in a financial context, is the final hour of daily trading in the stock market between the close of the bond market at 3 p.m. Eastern and the stock market close at 4 p.m.  Continue Reading

  • October 27, 2015 27 Oct'15

    Snowden effect

    The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001.  Continue Reading

  • October 22, 2015 22 Oct'15

    EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies ...  Continue Reading

  • October 21, 2015 21 Oct'15

    card dipping (EMV card dipping)

    Dipping can be contrasted with swiping. Swiping requires the cardholder to slide the card quickly through the reader. Dipping requires the cardholder to insert the card into the reader and wait until the reader indicates it has the information it ...  Continue Reading

  • October 20, 2015 20 Oct'15

    born digital

    Born digital, in reference to people, is a description of individuals who have grown up with the current state of near-ubiquitous computing, enabled by technology like smartphones and pervasive wireless networks.  Continue Reading

  • October 17, 2015 17 Oct'15

    Safari

    Safari is Apple's default Web browser for OS X and iOS-based devices.  Continue Reading

  • October 16, 2015 16 Oct'15

    form factor

    In computers, the form factor is the size, configuration, or physical arrangement of a computing device.  Continue Reading

  • October 16, 2015 16 Oct'15

    projector phone

    A projector phone is a smartphone with an embedded pico projector. Pico projectors are standalone, peripheral or embedded devices that make it possible to project presentations and other media content without requiring the bulky and not particularly...  Continue Reading

  • October 15, 2015 15 Oct'15

    emoji

    An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications. The emoji is the graphical successor to the emoticon.  Continue Reading

  • October 14, 2015 14 Oct'15

    transistor

    The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.  Continue Reading

  • October 14, 2015 14 Oct'15

    pico projector

    A pico projector is a small hardware device designed to project content from a smartphone, camera, notebook or memory device, typically for content viewing or presentations.  Continue Reading

  • October 13, 2015 13 Oct'15

    corporate performance

    Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.  Continue Reading

  • October 13, 2015 13 Oct'15

    Peter principle

    The Peter principle is an observance about a commonly-seen pattern in which an employee is promoted based on performance in their current position rather than their fit for the role they are being promoted to.  Continue Reading

  • October 08, 2015 08 Oct'15

    wearables security

    Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close