Browse Definitions:
  • March 31, 2015 31 Mar'15

    burstiness

    Burstiness is an intermittent type of data transmission. That transmission type contrasts with with streamed, paced or continuous transmissions.  Continue Reading

  • March 31, 2015 31 Mar'15

    vendor

    A vendor is an individual or company that sells goods or services to somone else in the economic production chain. Learn about different types of vendors.  Continue Reading

  • March 31, 2015 31 Mar'15

    hypervisor attack

    A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could have devastating consequences.  Continue Reading

  • March 31, 2015 31 Mar'15

    attack surface analysis

    An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those ...  Continue Reading

  • March 31, 2015 31 Mar'15

    public sector

    The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.  Continue Reading

  • March 30, 2015 30 Mar'15

    RFC 1918

    RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet.  Continue Reading

  • March 27, 2015 27 Mar'15

    network socket

    Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API). The most common sockets API is the Berkeley UNIX C interface for sockets.  Continue Reading

  • March 26, 2015 26 Mar'15

    5G

    Although 5G, the fifth-generation wireless standard, is not scheduled for launch until 2020, some manufacturers are already incorporating some of the coming standard's specifications into their products.  Continue Reading

  • March 26, 2015 26 Mar'15

    behavioral biometrics

    Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints.  Continue Reading

  • March 26, 2015 26 Mar'15

    National Vulnerability Database (NVD)

    NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability ...  Continue Reading

  • March 26, 2015 26 Mar'15

    enterprise search

    There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.” Each has relative advantages and disadvantages.  Continue Reading

  • March 26, 2015 26 Mar'15

    virtual payment terminal

    Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.  Continue Reading

  • March 25, 2015 25 Mar'15

    critical path

    The critical path is the longest sequence of tasks in a project plan. Each task must be completed before the next can be begun.  Continue Reading

  • March 25, 2015 25 Mar'15

    negative float (negative slack)

    Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.  Continue Reading

  • March 25, 2015 25 Mar'15

    float (project float, slack)

    In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project. Essentially, float is margin for error -- the amount of time that a task can be delayed without ...  Continue Reading

  • March 21, 2015 21 Mar'15

    cone of uncertainty

    The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.  Continue Reading

  • March 20, 2015 20 Mar'15

    pick two (pick any two)

    Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.  Continue Reading

  • March 20, 2015 20 Mar'15

    triple constraint

    The project management triangle is also known as the triple constraint, the project management triple constraint and the the iron triangle. The model defines the most significant project management constraints: scope, time and cost.  Continue Reading

  • March 19, 2015 19 Mar'15

    constraint (project constraint)

    A project constraint is any limit or restriction applied to a project. The traditional triple constraint of project management, for example, consists of time, cost and scope.  Continue Reading

  • March 18, 2015 18 Mar'15

    what if scenario analysis (WISA)

    A business can use what if scenario analysis (WISA) to see how a given outcome, such as project costs, might be affected by changes in particular variables, such as the late delivery of supplies or the unavailability of key personnel.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close