Browse Definitions:
  • June 30, 2015 30 Jun'15

    Roles and responsibilities guide: What does a CIO do?

    Learn about the role of the chief information officer including daily responsibilities, necessary skills and how the role is evolving in the digital age.  Continue Reading

  • June 30, 2015 30 Jun'15

    data residency (data sovereignty)

    Data residency is the physical location or locations of an organization's data and the area of storage management involved with managing the complexities resulting from the locations in question. Data residency is sometimes called data sovereignty, ...  Continue Reading

  • June 29, 2015 29 Jun'15

    cloud configuration

    Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate. The complexities of a cloud environment, and a hybrid cloud environment in particular, make...  Continue Reading

  • June 26, 2015 26 Jun'15

    lossless and lossy compression

    Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.  Continue Reading

  • June 25, 2015 25 Jun'15

    Project Vault

    Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.  Continue Reading

  • June 25, 2015 25 Jun'15

    gesture recognition

    Gesture recognition is the mathematical interpretation of a human motion by a computing device. In personal computing, gestures are most often used for input commands.  Continue Reading

  • June 25, 2015 25 Jun'15

    hotword

    Hotword is an audio listening module included with Google Chrome and Chromium, the open source version of the browser. Hotword listens for key words that activate the “OK Google” voice interface.  Continue Reading

  • June 24, 2015 24 Jun'15

    Google ATAP (Advanced Technologies and Products)

    Google ATAP (Advanced Technologies and Products) is the company's development lab for disruptive technologies. ATAP projects include Project Tango (a high-end tablet optimized for 3-D applications and gaming), Project Jacquard (tech-embedded fabric...  Continue Reading

  • June 23, 2015 23 Jun'15

    Payment Card Industry (PCI)

    The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.  Continue Reading

  • June 22, 2015 22 Jun'15

    data currency (data as currency)

    Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money.  Continue Reading

  • June 19, 2015 19 Jun'15

    logical interface (LIF)

    A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.  Continue Reading

  • June 18, 2015 18 Jun'15

    Quick Start Glossary: Hybrid cloud

    A handy printable glossary of hybrid cloud vocabulary. Online, the terms are linked to our full definitions and more related resources.  Continue Reading

  • June 18, 2015 18 Jun'15

    Hybrid cloud vocabulary quiz

    Take this quiz to find out how much you know about the essential terminology related to hybrid cloud technologies. See also, our Quick Start Glossary: Hybrid cloud.  Continue Reading

  • June 17, 2015 17 Jun'15

    filter bubble

    A filter bubble is the  restriction of a user's perspective that can be created by personalized search technologies. For many research tasks, personalized search can return less relevant results than would be the case with an unfiltered search.  Continue Reading

  • June 17, 2015 17 Jun'15

    personalized search

    Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.” Google uses a combination of information from user search history, bookmarks and personalized Google+...  Continue Reading

  • June 17, 2015 17 Jun'15

    DuckDuckGo

    DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).  Continue Reading

  • June 16, 2015 16 Jun'15

    latitude and longitude

    Latitude and longitude are angles that uniquely define points on a sphere. Together, the angles comprise a coordinate scheme that can locate or identify geographic positions on the surfaces of planets such as the earth.  Continue Reading

  • June 16, 2015 16 Jun'15

    Linux Mint

    Linux Mint is a free and open source operating system (OS) distribution based on Ubuntu and Debian for use on x-86 x-64-compatible machines.  Continue Reading

  • June 15, 2015 15 Jun'15

    Let's Encrypt

    Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates.  Continue Reading

  • June 12, 2015 12 Jun'15

    OpenPGP

    OpenPGP is an open and free version of the Pretty Good Privacy (PGP) standard that defines encryption formats to enable private messaging abilities for email and other message encryption.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close