Browse Definitions:
  • August 31, 2015 31 Aug'15

    first-person view (FPV)

    First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video ...  Continue Reading

  • August 31, 2015 31 Aug'15

    drone surveillance

    Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.  Continue Reading

  • August 28, 2015 28 Aug'15

    drone journalism

    Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.  Continue Reading

  • August 27, 2015 27 Aug'15

    time value of money

    Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.  Continue Reading

  • August 27, 2015 27 Aug'15

    tag-jacking

    Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and ...  Continue Reading

  • August 26, 2015 26 Aug'15

    Windows 10 Mobile

    Windows 10 Mobile is Microsoft’s operating system for handheld devices; the mobile OS follows Windows Phone 8. The operating system, which replaces Windows Phone, is designed as a step towards the unification of Windows desktop and mobile systems.  Continue Reading

  • August 13, 2015 13 Aug'15

    secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps.  Continue Reading

  • August 10, 2015 10 Aug'15

    extension strategy

    An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline. Extension strategies include rebranding, ...  Continue Reading

  • August 07, 2015 07 Aug'15

    open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.  Continue Reading

  • August 07, 2015 07 Aug'15

    volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

    Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.  Continue Reading

  • August 06, 2015 06 Aug'15

    Kerckhoff's principle

    Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.  Continue Reading

  • August 05, 2015 05 Aug'15

    telepresence

    Telepresence is a sophisticated form of robotic remote control in which a human operator has a sense of being in a remote location so that the experience resembles virtual reality (VR).  Continue Reading

  • August 05, 2015 05 Aug'15

    BOINC (Berkeley Open Infrastructure for Network Computing)

    BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.  Continue Reading

  • August 03, 2015 03 Aug'15

    center of excellence (CoE)

    A center of excellence (CoE) is a corporate department or team that provides support, guidance, leadership and training for other employees in regard to a specific area of the business.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close