Browse Definitions:
  • July 31, 2015 31 Jul'15

    rapid mobile app development (RMAD)

    Rapid mobile app development (RMAD) is the use of code-free programming tools to speed the process of creating applications for mobile platforms.  Continue Reading

  • July 30, 2015 30 Jul'15

    deprecated

    In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.  Continue Reading

  • July 28, 2015 28 Jul'15

    security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that would make it ...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.  Continue Reading

  • July 24, 2015 24 Jul'15

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • July 21, 2015 21 Jul'15

    data literacy

    Data literacy is the ability to derive information from data, just as literacy in general is the ability to derive information from the written word.  Continue Reading

  • July 20, 2015 20 Jul'15

    security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness.   Continue Reading

  • July 20, 2015 20 Jul'15

    case study

    In a business context, a case study is a documented implementation of something, such as a practice, a product or a service. An organization might deploy, for example, a new business intelligence (BI) platform. A case study of its implementation ...  Continue Reading

  • July 17, 2015 17 Jul'15

    codebase (code base)

    A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.  Continue Reading

  • July 16, 2015 16 Jul'15

    hard error

    A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.  Continue Reading

  • July 16, 2015 16 Jul'15

    soft error

    A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way. Errors that change data stored in RAM are either soft errors or hard errors, which result from a hardware failure.  Continue Reading

  • July 16, 2015 16 Jul'15

    memory read error

    A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.  Continue Reading

  • July 15, 2015 15 Jul'15

    niche app

    A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices. Niche apps can be seen as a divergence from the large, generalized social media platforms such as Facebook and Twitter.  Continue Reading

  • July 14, 2015 14 Jul'15

    negative correlation

    A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.  Correlation is expressed on a range from +1 to -1, known as the correlation coefficent. Values below zero express ...  Continue Reading

  • July 14, 2015 14 Jul'15

    authenticated security scan

    An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an inside vantage point and find many ...  Continue Reading

  • July 14, 2015 14 Jul'15

    unauthenticated security scan (logged-out secuity scan)

    An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.  Continue Reading

  • July 09, 2015 09 Jul'15

    Euler diagram

    An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.  Continue Reading

  • July 08, 2015 08 Jul'15

    pixel

    The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.  Continue Reading

  • July 08, 2015 08 Jul'15

    IDOV methodology (identify, design, optimize, verify)

    The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close