Browse Definitions:
  • July 31, 2015 31 Jul'15

    rapid mobile app development (RMAD)

    Rapid mobile app development (RMAD) is the use of code-free programming tools to speed the process of creating applications for mobile platforms.  Continue Reading

  • July 30, 2015 30 Jul'15

    deprecated

    In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.  Continue Reading

  • July 28, 2015 28 Jul'15

    security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that would make it ...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.  Continue Reading

  • July 24, 2015 24 Jul'15

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • July 21, 2015 21 Jul'15

    data literacy

    Data literacy is the ability to derive information from data, just as literacy in general is the ability to derive information from the written word.  Continue Reading

  • July 20, 2015 20 Jul'15

    security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness.   Continue Reading

  • July 20, 2015 20 Jul'15

    case study

    In a business context, a case study is a documented implementation of something, such as a practice, a product or a service. An organization might deploy, for example, a new business intelligence (BI) platform. A case study of its implementation ...  Continue Reading

  • July 17, 2015 17 Jul'15

    codebase (code base)

    A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.  Continue Reading

  • July 16, 2015 16 Jul'15

    hard error

    A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.  Continue Reading

  • July 16, 2015 16 Jul'15

    soft error

    A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way. Errors that change data stored in RAM are either soft errors or hard errors, which result from a hardware failure.  Continue Reading

  • July 16, 2015 16 Jul'15

    memory read error

    A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.  Continue Reading

  • July 15, 2015 15 Jul'15

    niche app

    A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices. Niche apps can be seen as a divergence from the large, generalized social media platforms such as Facebook and Twitter.  Continue Reading

  • July 14, 2015 14 Jul'15

    negative correlation

    A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.  Correlation is expressed on a range from +1 to -1, known as the correlation coefficent. Values below zero express ...  Continue Reading

  • July 14, 2015 14 Jul'15

    authenticated security scan

    An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an inside vantage point and find many ...  Continue Reading

  • July 14, 2015 14 Jul'15

    unauthenticated security scan (logged-out secuity scan)

    An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.  Continue Reading

  • July 09, 2015 09 Jul'15

    Euler diagram

    An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.  Continue Reading

  • July 08, 2015 08 Jul'15

    pixel

    The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.  Continue Reading

  • July 08, 2015 08 Jul'15

    IDOV methodology (identify, design, optimize, verify)

    The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

  • adware

    Adware is any software application in which advertising banners are displayed while a program is running.

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close