Browse Definitions:
  • July 31, 2015 31 Jul'15

    rapid mobile app development (RMAD)

    Rapid mobile app development (RMAD) is the use of code-free programming tools to speed the process of creating applications for mobile platforms.  Continue Reading

  • July 30, 2015 30 Jul'15

    deprecated

    In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.  Continue Reading

  • July 28, 2015 28 Jul'15

    security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that would make it ...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.  Continue Reading

  • July 24, 2015 24 Jul'15

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • July 21, 2015 21 Jul'15

    data literacy

    Data literacy is the ability to derive information from data, just as literacy in general is the ability to derive information from the written word.  Continue Reading

  • July 20, 2015 20 Jul'15

    security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness.   Continue Reading

  • July 20, 2015 20 Jul'15

    case study

    In a business context, a case study is a documented implementation of something, such as a practice, a product or a service. An organization might deploy, for example, a new business intelligence (BI) platform. A case study of its implementation ...  Continue Reading

  • July 17, 2015 17 Jul'15

    codebase (code base)

    A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.  Continue Reading

  • July 16, 2015 16 Jul'15

    hard error

    A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.  Continue Reading

  • July 16, 2015 16 Jul'15

    soft error

    A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way. Errors that change data stored in RAM are either soft errors or hard errors, which result from a hardware failure.  Continue Reading

  • July 16, 2015 16 Jul'15

    memory read error

    A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.  Continue Reading

  • July 15, 2015 15 Jul'15

    niche app

    A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices. Niche apps can be seen as a divergence from the large, generalized social media platforms such as Facebook and Twitter.  Continue Reading

  • July 14, 2015 14 Jul'15

    negative correlation

    A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.  Correlation is expressed on a range from +1 to -1, known as the correlation coefficent. Values below zero express ...  Continue Reading

  • July 14, 2015 14 Jul'15

    authenticated security scan

    An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an inside vantage point and find many ...  Continue Reading

  • July 14, 2015 14 Jul'15

    unauthenticated security scan (logged-out secuity scan)

    An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.  Continue Reading

  • July 09, 2015 09 Jul'15

    Euler diagram

    An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.  Continue Reading

  • July 08, 2015 08 Jul'15

    pixel

    The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.  Continue Reading

  • July 08, 2015 08 Jul'15

    IDOV methodology (identify, design, optimize, verify)

    The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close