Browse Definitions:
  • October 30, 2015 30 Oct'15

    holographic display

    A holographic display is a display that uses coherent light, such as that created by laser, to create a three-dimensional (3D) image in space.  Continue Reading

  • October 29, 2015 29 Oct'15

    format war

    A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.  Continue Reading

  • October 29, 2015 29 Oct'15

    Freedom on the Net report

    Freedom on the Net is an annual report on the extent to which people in countries around the globe can publish and access Internet content without undue restriction and have their rights respected.  Continue Reading

  • October 28, 2015 28 Oct'15

    kanban

    Kanban is a visual signal that's used to trigger an action. At its simplest, kanban is a card with an inventory number that’s attached to a part.  Continue Reading

  • October 28, 2015 28 Oct'15

    liquid computing

    Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop before leaving the office and start from the same point ...  Continue Reading

  • October 27, 2015 27 Oct'15

    federated search (universal search)

    Federated search is an approach to information retrieval that aggregates query results from multiple information sources. Federated search may also be called universal search.  Continue Reading

  • October 27, 2015 27 Oct'15

    witching hour

    Witching hour, in a financial context, is the final hour of daily trading in the stock market between the close of the bond market at 3 p.m. Eastern and the stock market close at 4 p.m.  Continue Reading

  • October 27, 2015 27 Oct'15

    Snowden effect

    The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001.  Continue Reading

  • October 22, 2015 22 Oct'15

    EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies ...  Continue Reading

  • October 21, 2015 21 Oct'15

    card dipping (EMV card dipping)

    Dipping can be contrasted with swiping. Swiping requires the cardholder to slide the card quickly through the reader. Dipping requires the cardholder to insert the card into the reader and wait until the reader indicates it has the information it ...  Continue Reading

  • October 20, 2015 20 Oct'15

    born digital

    Born digital, in reference to people, is a description of individuals who have grown up with the current state of near-ubiquitous computing, enabled by technology like smartphones and pervasive wireless networks.  Continue Reading

  • October 17, 2015 17 Oct'15

    Safari

    Safari is Apple's default Web browser for OS X and iOS-based devices.  Continue Reading

  • October 16, 2015 16 Oct'15

    form factor

    In computers, the form factor is the size, configuration, or physical arrangement of a computing device.  Continue Reading

  • October 16, 2015 16 Oct'15

    projector phone

    A projector phone is a smartphone with an embedded pico projector. Pico projectors are standalone, peripheral or embedded devices that make it possible to project presentations and other media content without requiring the bulky and not particularly...  Continue Reading

  • October 15, 2015 15 Oct'15

    emoji

    An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications. The emoji is the graphical successor to the emoticon.  Continue Reading

  • October 14, 2015 14 Oct'15

    transistor

    The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.  Continue Reading

  • October 14, 2015 14 Oct'15

    pico projector

    A pico projector is a small hardware device designed to project content from a smartphone, camera, notebook or memory device, typically for content viewing or presentations.  Continue Reading

  • October 13, 2015 13 Oct'15

    corporate performance

    Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.  Continue Reading

  • October 13, 2015 13 Oct'15

    Peter principle

    The Peter principle is an observance about a commonly-seen pattern in which an employee is promoted based on performance in their current position rather than their fit for the role they are being promoted to.  Continue Reading

  • October 08, 2015 08 Oct'15

    wearables security

    Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close