Browse Definitions:
  • August 31, 2015 31 Aug'15

    first-person view (FPV)

    First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video ...  Continue Reading

  • August 31, 2015 31 Aug'15

    drone surveillance

    Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.  Continue Reading

  • August 28, 2015 28 Aug'15

    drone journalism

    Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.  Continue Reading

  • August 27, 2015 27 Aug'15

    time value of money

    Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.  Continue Reading

  • August 27, 2015 27 Aug'15

    tag-jacking

    Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and ...  Continue Reading

  • August 26, 2015 26 Aug'15

    Windows 10 Mobile

    Windows 10 Mobile is Microsoft’s operating system for handheld devices; the mobile OS follows Windows Phone 8. The operating system, which replaces Windows Phone, is designed as a step towards the unification of Windows desktop and mobile systems.  Continue Reading

  • August 13, 2015 13 Aug'15

    secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps.  Continue Reading

  • August 10, 2015 10 Aug'15

    extension strategy

    An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline. Extension strategies include rebranding, ...  Continue Reading

  • August 07, 2015 07 Aug'15

    open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.  Continue Reading

  • August 07, 2015 07 Aug'15

    volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

    Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.  Continue Reading

  • August 06, 2015 06 Aug'15

    Kerckhoff's principle

    Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.  Continue Reading

  • August 05, 2015 05 Aug'15

    telepresence

    Telepresence is a sophisticated form of robotic remote control in which a human operator has a sense of being in a remote location so that the experience resembles virtual reality (VR).  Continue Reading

  • August 05, 2015 05 Aug'15

    BOINC (Berkeley Open Infrastructure for Network Computing)

    BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.  Continue Reading

  • August 03, 2015 03 Aug'15

    center of excellence (CoE)

    A center of excellence (CoE) is a corporate department or team that provides support, guidance, leadership and training for other employees in regard to a specific area of the business.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of ...

  • polymorphic virus

    A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

SearchHealthIT

  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in...

  • personal health record (PHR)

    A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual ...

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close